DocumentCode
1728481
Title
Hide and code: Session anonymity in wireless line networks with coded packets
Author
Sousa-Pinto, Hugo ; Lucani, Daniel E. ; Barros, João
Author_Institution
Fac. de Eng., Dept. de Eng. Electrotec. e de Comput., Univ. do Porto, Porto, Portugal
fYear
2012
Firstpage
262
Lastpage
268
Abstract
The broadcast nature of the communication channel enables a malicious eavesdropper to gain information about connectivity and active sessions in a multi-hop wireless network. This can be achieved simply by overhearing the transmitted signals over the ether and analyzing their timings. Focusing on techniques that can meet information-theoretic criteria for session anonymity under traffic analysis attacks, we rely on a judicious choice of transmission schedules to conceal multicast or bidirectional unicast sessions from a global eavesdropper at any given point in time. A systematic approach for constructing the aforementioned transmission schedules for arbitrary network topologies is derived from an equivalent coloring problem in an auxiliary conflict graph. Although this type of anonymity requires various nodes to send dummy transmissions to confuse the eavesdropper, our results show that the additional cost in terms of energy, delay and throughput can be alleviated using network coding. The key intuition is that dummy transmissions can be replaced by coded transmissions, which carry useful information. For the case of a line network with N nodes supporting coded flows, we derive closed-form expressions, which show that anonymity comes at no cost in terms of throughput if at least one of the destinations is two hops away. The average per packet delay is shown to increase by at most 50%.
Keywords
network coding; radio networks; telecommunication channels; telecommunication security; arbitrary network topologies; auxiliary conflict graph; bidirectional unicast sessions; coded packets; coded transmissions; communication channel; dummy transmissions; equivalent coloring problem; information-theoretic criteria; line network; malicious eavesdropper; multihop wireless network; network coding; session anonymity; traffic analysis attacks; wireless line networks; Color; Delay; Network coding; Nickel; Schedules; Throughput; Unicast;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory and Applications Workshop (ITA), 2012
Conference_Location
San Diego, CA
Print_ISBN
978-1-4673-1473-2
Type
conf
DOI
10.1109/ITA.2012.6181791
Filename
6181791
Link To Document