scispace - formally typeset
Open Access

Power-Aware Traffic Cover Mode to Prevent Traffic Analysis in Wireless Ad Hoc Networks

TLDR
A suitable cover mode with the objective of minimizing energy consumption is developed -- the nodes in wireless ad hoc networks typically have limited battery supply, therefore, it is important to minimize the energy consumption.
Abstract
Traffic analysis poses a serious threat to communication security, especially in wireless networks. Encryption may be used to hide message contents, whereas traffic padding may be used to hide the traffic pattern. This paper deals with the issue of preventing traffic analysis by inserting dummy (or padding) traffic to hide the real traffic pattern. The observable traffic pattern, after dummy traffic has been inserted, is referred to as a cover mode. Since the dummy traffic incurs an overhead, it is important to minimize dummy traffic while achieving the desired security objective. In this paper, we attempt to develop a suitable cover mode with the objective of minimizing energy of preventing traffic analysis by inserting dummy (or padding) traffic to hide the real traffic pattern. The observable traffic pattern, after dummy traffic has been inserted, is referred to as a cover mode. Since the dummy traffic incurs an overhead, it is important to minimize dummy traffic while achieving the desired security objective. In this paper, we attempt to develop a suitable cover mode with the objective of minimizing energy consumption -- the nodes in wireless ad hoc networks typically have limited battery supply, therefore, it is important to minimize the energy consumption. We propose different methods for implementing the cover mode, and evaluate the impact of these techniques on system lifetime and on energy consumption per unit of real traffic transmitted in the network.

read more

Citations
More filters
Journal ArticleDOI

Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach

TL;DR: In this article, the authors consider user location privacy in mobile edge clouds (MECs) and consider using chaff services to defend against an eavesdropper, with a focus on strategies to control the chaffs.
Posted Content

Location Privacy in Mobile Edge Clouds: A Chaff-based Approach

TL;DR: In this paper, the authors consider user location privacy in mobile edge clouds (MECs) and consider using chaff services to defend against an eavesdropper, with focus on strategies to control the chaffs.
Proceedings ArticleDOI

Preventing traffic analysis in packet radio networks

TL;DR: Different methods of constructing a traffic cover mode are discussed, an optimality problem is formulated, and a solution to it is presented.
Journal ArticleDOI

Using caching for browsing anonymity

TL;DR: A caching proxy system for allowing users to retrieve data from the World-Wide Web in a way that would provide recipient unobservability by a third party and sender unobservable by the recipient and thus dispose with intersection attacks, and report on the prototype built using Google.
References
More filters
Book

Introduction to Algorithms

TL;DR: The updated new edition of the classic Introduction to Algorithms is intended primarily for use in undergraduate or graduate courses in algorithms or data structures and presents a rich variety of algorithms and covers them in considerable depth while making their design and analysis accessible to all levels of readers.

Dynamic Source Routing in Ad Hoc Wireless Networks.

TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI

Dynamic Source Routing in Ad Hoc Wireless Networks

TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Proceedings ArticleDOI

Power-aware routing in mobile ad hoc networks

TL;DR: In this article, the authors present a case for using new power-aware metn.cs for determining routes in wireless ad hoc networks and show that using these new metrics ensures that the mean time to node failure is increased si~cantly.
Related Papers (5)