Question:
Are MESH Networks an invasion of privacy?
2010-07-08 04:11:39 UTC
===============================================================================

Snort received 223 packets
Analyzed: 222(99.552%)
Dropped: 0(0.000%)
Outstanding: 1(0.448%)
===============================================================================
Breakdown by protocol:
TCP: 0 (0.000%)
UDP: 222 (100.000%)
ICMP: 0 (0.000%)
ARP: 0 (0.000%)
EAPOL: 0 (0.000%)
IPv6: 0 (0.000%)
ETHLOOP: 0 (0.000%)
IPX: 0 (0.000%)
FRAG: 0 (0.000%)
OTHER: 0 (0.000%)
DISCARD: 0 (0.000%)
InvChkSum: 0 (0.000%)

Look's like they're running EtherPEEK and when I was reading the instructions it was very specific that they do not operate standard IP protocol...
Four answers:
dickery
2010-07-08 14:47:42 UTC
Censorship and filtering

The danish police cooperating with most danish ISP-s to filter the web-sites that users are allowed to access. The police have signed contracts with the ISP (which IT-Pol got though rules about access to official documents). We beliewe this is censorship.

Summary

There is still many technical and user oriented issues that have to be sorted out to regain the lost privacy in everyday use for most people: The TOR network is too slow for many uses. Distribution of keys for e.g. encrypted email is not simple enough for many people. On the other hand there also many technologies with potential for privacy: Mesh networks, cheap and open hardware like Linux-based access-points, PDA's and phones.



Polippix has helped the debate about privacy. Although there is not anything new on the Polippix CD, getting a physical CD that circumvents the surveillance has been an eye-opener for many. It demonstrates that we give up privacy for practically nothing. Although only a small part of the population use Polippix or similar techniques, getting Polippix out tens of thousands of Danes demonstrates that protecting your privacy is a very real concern for others than geeks and hard-core criminals.



* Forening
2010-07-08 05:23:12 UTC
Mesh networking is a way to route data, voice and instructions between nodes. It allows for continuous connections and reconfiguration around broken or blocked paths by “hopping” from node to node until the destination is reached. A mesh network whose nodes are all connected to each other is a fully connected network. Mesh networks differ from other networks in that the component parts can all connect to each other via multiple hops, and they generally are not mobile. Mesh networks can be seen as one type of ad hoc network. Mobile ad hoc networks (MANET) and mesh networks are therefore closely related, but MANET also have to deal with the problems introduced by the mobility of the nodes.



Mesh networks are self-healing: the network can still operate even when a node breaks down or a connection goes bad. As a result, this network is very reliable. This concept is applicable to wireless networks, wired networks, and software interaction. The animation at right illustrates how wireless mesh networks can self form and self heal. For more animations see History of Wireless Mesh Networking



Wireless mesh networks is the most topical application of mesh architectures. Wireless mesh was originally developed for military applications but have undergone significant evolution in the past decade. As the cost of radios plummeted, single radio products evolved to support more radios per mesh node with the additional radios providing specific functions- such as client access, backhaul service or scanning radios for high speed handover in mobility applications. The mesh node design also became more modular - one box could support multiple radio cards - each operating at a different frequency.



Work in this field has been aided by the use of game theory methods to analyze strategies for the allocation of resources and routing of packets.
2010-07-08 08:22:21 UTC
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous routing algorithm cannot be directly applied to Mesh network, because they do not defend global attackers. In this paper we design private routing algorithm that used "Onion", i.e., layered encryption, to hide routing information. In addition, we explore special ring topology that fits the investigated network scenario, to preserve a certain level of privacy against a global adversary.

http://portal.acm.org/citation.cfm?id=1180345.1180348



Multi-hop wireless mesh network (WMN) has attracted increasing attention and deployment as a lowcost approach to provide last-mile broadband Internet access. Privacy is a critical issue in WMN, as traffic of an end user is relayed via multiple wireless mesh routers. Due to the unique characteristics of WMN, the existing solutions applied in Internet are either ineffective at preserving privacy of WMN users, or will cause severe performance degradation. In this paper, we propose a light-weight privacy preserving solution aimed to achieve well-maintained balance between network performance and traffic privacy preservation. At the center of this solution is a novel metric called traffic entropy, which quantifies the amount of information required to describe the traffic pattern and is used to characterize the performance of traffic privacy preservation. We further present a penalty-based shortest path routing algorithm that maximally preserves traffic privacy by minimizing the mutual information of traffic entropy observed at each individual relaying node, meanwhile controlling performance degradation within the acceptable region. Extensive simulation study proves the soundness of our solution.

http://www.truststc.org/pubs/53.html





You can read book

Security in Wireless Mesh Networks

By Yan Zhang, Jun Zheng, Honglin Hu

at http://books.google.ba/books?id=VyoE7LmsHEAC&dq=MESH+Networks+privacy&printsec=frontcover&source=bl&ots=ChE32aChi4&sig=b0kZ8K-xI-zTvT1AP3WlTOi-irg#PPA4,M1
heptinstall
2017-01-15 18:53:35 UTC
No, it is not an invasion of privateness. loads of places of employer have recording instruments in recent times (eg. nook shop, gas station, department stores, ATMS, etc.) to avert theft, genuine? properly, the belief is a similar for this reason different than it extremely is getting used to deter human beings from breaking the regulation by utilising rushing and probably hurting/killing others.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...