In this report, we will provide the detailed theoretical analysis including some omitted proofs in our latest submission to Infocom 2008. For more details about the framework prot...
—Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered. Using Shannon’s equivocation as an information theoretic measure of anonym...