File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/NPSEC.2007.4371622
- Scopus: eid_2-s2.0-47249090110
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Packet cloaking: Protecting receiver privacy against traffic analysis
Title | Packet cloaking: Protecting receiver privacy against traffic analysis |
---|---|
Authors | |
Keywords | Internet Internet protocols Network protocols Experimental evaluations Metrics (co) |
Issue Date | 2007 |
Publisher | IEEE. |
Citation | The 3rd IEEE Workshop on Secure Network Protocols (NPSec) 2007, Beijing, China, 16 October 2007. In Proceedings of the 3rd NPSec, 2007, p. 37-42 How to Cite? |
Abstract | With widespread use of the Internet, there is an increase in concern over users' privacy. In particular, an adversary may identify the receiver involved in a communication session by observing the packet traffic. We propose a new routing mechanism, which we call packet cloaking, to protect the privacy of a receiver. The main idea of packet cloaking is to transmit multiple copies of a sent packet to a selected group of k receivers, so that an adversary may only identify the true receiver with a probability of 1/k. We present the system design to support packet cloaking. We also propose two metrics that measure the receiver privacy, based on evaluating the similarity between the sender/receiver traffic patterns. We have performed experimental evaluations to verify the effectiveness of our approach. |
Persistent Identifier | http://hdl.handle.net/10722/129578 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cheng, R | en_HK |
dc.contributor.author | Yau, DKY | en_HK |
dc.contributor.author | Fu, J | en_HK |
dc.date.accessioned | 2010-12-23T08:39:26Z | - |
dc.date.available | 2010-12-23T08:39:26Z | - |
dc.date.issued | 2007 | en_HK |
dc.identifier.citation | The 3rd IEEE Workshop on Secure Network Protocols (NPSec) 2007, Beijing, China, 16 October 2007. In Proceedings of the 3rd NPSec, 2007, p. 37-42 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/129578 | - |
dc.description.abstract | With widespread use of the Internet, there is an increase in concern over users' privacy. In particular, an adversary may identify the receiver involved in a communication session by observing the packet traffic. We propose a new routing mechanism, which we call packet cloaking, to protect the privacy of a receiver. The main idea of packet cloaking is to transmit multiple copies of a sent packet to a selected group of k receivers, so that an adversary may only identify the true receiver with a probability of 1/k. We present the system design to support packet cloaking. We also propose two metrics that measure the receiver privacy, based on evaluating the similarity between the sender/receiver traffic patterns. We have performed experimental evaluations to verify the effectiveness of our approach. | en_HK |
dc.language | eng | en_US |
dc.publisher | IEEE. | - |
dc.relation.ispartof | Proceedings of the IEEE Workshop on Secure Network Protocols, NPSec 2007 | en_HK |
dc.rights | ©2007 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | - |
dc.subject | Internet | - |
dc.subject | Internet protocols | - |
dc.subject | Network protocols | - |
dc.subject | Experimental evaluations | - |
dc.subject | Metrics (co) | - |
dc.title | Packet cloaking: Protecting receiver privacy against traffic analysis | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Cheng, R:ckcheng@cs.hku.hk | en_HK |
dc.identifier.authority | Cheng, R=rp00074 | en_HK |
dc.description.nature | published_or_final_version | - |
dc.identifier.doi | 10.1109/NPSEC.2007.4371622 | en_HK |
dc.identifier.scopus | eid_2-s2.0-47249090110 | en_HK |
dc.identifier.hkuros | 176466 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-47249090110&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.spage | 37 | en_HK |
dc.identifier.epage | 42 | en_HK |
dc.description.other | The 3rd IEEE Workshop on Secure Network Protocols (NPSec) 2007, Beijing, China, 16 October 2007. In Proceedings of the 3rd NPSec, 2007, p. 37-42 | - |
dc.identifier.scopusauthorid | Cheng, R=7201955416 | en_HK |
dc.identifier.scopusauthorid | Yau, DKY=34980075000 | en_HK |
dc.identifier.scopusauthorid | Fu, J=24468070400 | en_HK |