Open Access
Power-Aware Traffic Cover Mode to Prevent Traffic Analysis in Wireless Ad Hoc Networks
TLDR
A suitable cover mode with the objective of minimizing energy consumption is developed -- the nodes in wireless ad hoc networks typically have limited battery supply, therefore, it is important to minimize the energy consumption.Abstract:
Traffic analysis poses a serious threat to communication security, especially in wireless networks. Encryption may be used to hide message contents, whereas traffic padding may be used to hide the traffic pattern. This paper deals with the issue of preventing traffic analysis by inserting dummy (or padding) traffic to hide the real traffic pattern. The observable traffic pattern, after dummy traffic has been inserted, is referred to as a cover mode. Since the dummy traffic incurs an overhead, it is important to minimize dummy traffic while achieving the desired security objective. In this paper, we attempt to develop a suitable cover mode with the objective of minimizing energy of preventing traffic analysis by inserting dummy (or padding) traffic to hide the real traffic pattern. The observable traffic pattern, after dummy traffic has been inserted, is referred to as a cover mode. Since the dummy traffic incurs an overhead, it is important to minimize dummy traffic while achieving the desired security objective. In this paper, we attempt to develop a suitable cover mode with the objective of minimizing energy consumption -- the nodes in wireless ad hoc networks typically have limited battery supply, therefore, it is important to minimize the energy consumption. We propose different methods for implementing the cover mode, and evaluate the impact of these techniques on system lifetime and on energy consumption per unit of real traffic transmitted in the network.read more
Citations
More filters
Journal ArticleDOI
Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach
TL;DR: In this article, the authors consider user location privacy in mobile edge clouds (MECs) and consider using chaff services to defend against an eavesdropper, with a focus on strategies to control the chaffs.
Posted Content
Location Privacy in Mobile Edge Clouds: A Chaff-based Approach
TL;DR: In this paper, the authors consider user location privacy in mobile edge clouds (MECs) and consider using chaff services to defend against an eavesdropper, with focus on strategies to control the chaffs.
Proceedings ArticleDOI
Preventing traffic analysis in packet radio networks
TL;DR: Different methods of constructing a traffic cover mode are discussed, an optimality problem is formulated, and a solution to it is presented.
Journal ArticleDOI
Using caching for browsing anonymity
Anna Shubina,Sean W. Smith +1 more
TL;DR: A caching proxy system for allowing users to retrieve data from the World-Wide Web in a way that would provide recipient unobservability by a third party and sender unobservable by the recipient and thus dispose with intersection attacks, and report on the prototype built using Google.
References
More filters
Book
Introduction to Algorithms
TL;DR: The updated new edition of the classic Introduction to Algorithms is intended primarily for use in undergraduate or graduate courses in algorithms or data structures and presents a rich variety of algorithms and covers them in considerable depth while making their design and analysis accessible to all levels of readers.
Dynamic Source Routing in Ad Hoc Wireless Networks.
David B. Johnson,David A. Maltz +1 more
TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI
Dynamic Source Routing in Ad Hoc Wireless Networks
David B. Johnson,David A. Maltz +1 more
TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Proceedings ArticleDOI
Power-aware routing in mobile ad hoc networks
TL;DR: In this article, the authors present a case for using new power-aware metn.cs for determining routes in wireless ad hoc networks and show that using these new metrics ensures that the mean time to node failure is increased si~cantly.
Related Papers (5)
Traffic-Aware Traffic Signal Control Framework Based on SDN and Cloud-Fog Computing
Hung-Chin Jang,Ting-Kuan Lin +1 more