File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/INFCOM.2011.5934873
- Scopus: eid_2-s2.0-79960862937
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Anonymous communication with network coding against traffic analysis attack
Title | Anonymous communication with network coding against traffic analysis attack |
---|---|
Authors | |
Keywords | Algorithm complexity Anonymous communication Effective algorithms Influential factors ITS efficiencies |
Issue Date | 2011 |
Publisher | I E E E, Computer Society. The Journal's web site is located at http://www.ieee-infocom.org/ |
Citation | The IEEE INFOCOM 2011, Shanghai, China, 10-15 April 2011. In Conference Proceedings, 2011, p. 1008-1016 How to Cite? |
Abstract | Flow untraceability is one critical requirement for anonymous communication with network coding, which prevents malicious attackers with wiretapping and traffic analysis abilities from relating the senders to the receivers, using linear dependency of the received packets. There have recently been proposals advocating encryptions on the Global Encoding Vectors (GEV) of network coding to thwart such attacks [1], [2]. Nevertheless, there has been no exploration of the capability of networking coding itself, to constitute more efficient and effective algorithms which guarantee anonymity. In this paper, we design a novel, simple, and effective linear network coding mechanism (ALNCode) to achieve flow untraceability in a communication network with multiple unicast flows. With solid theoretical analysis, we first show that linear network coding (LNC) can be applied to thwart traffic analysis attacks without the need of encrypting GEVs. Our key idea is to mix multiple flows at their intersection nodes by generating downstream GEVs from the common basis of upstream GEVs belonging to multiple flows, in order to hide the correlation of upstream and downstream GEVs in each flow. We then design a deterministic LNC scheme to implement our idea, by which the downstream GEVs produced are guaranteed to obfuscate their correlation with the corresponding upstream GEVs. We also give extensive theoretical analysis on the intersection probability of GEV bases and the influential factors to the effectiveness of our scheme, as well as the algorithm complexity to support its efficiency. © 2011 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/135704 |
ISSN | 2023 SCImago Journal Rankings: 2.865 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, J | en_HK |
dc.contributor.author | Wang, J | en_HK |
dc.contributor.author | Wu, C | en_HK |
dc.contributor.author | Lu, K | en_HK |
dc.contributor.author | Gu, N | en_HK |
dc.date.accessioned | 2011-07-27T01:46:59Z | - |
dc.date.available | 2011-07-27T01:46:59Z | - |
dc.date.issued | 2011 | en_HK |
dc.identifier.citation | The IEEE INFOCOM 2011, Shanghai, China, 10-15 April 2011. In Conference Proceedings, 2011, p. 1008-1016 | en_HK |
dc.identifier.issn | 0743-166X | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/135704 | - |
dc.description.abstract | Flow untraceability is one critical requirement for anonymous communication with network coding, which prevents malicious attackers with wiretapping and traffic analysis abilities from relating the senders to the receivers, using linear dependency of the received packets. There have recently been proposals advocating encryptions on the Global Encoding Vectors (GEV) of network coding to thwart such attacks [1], [2]. Nevertheless, there has been no exploration of the capability of networking coding itself, to constitute more efficient and effective algorithms which guarantee anonymity. In this paper, we design a novel, simple, and effective linear network coding mechanism (ALNCode) to achieve flow untraceability in a communication network with multiple unicast flows. With solid theoretical analysis, we first show that linear network coding (LNC) can be applied to thwart traffic analysis attacks without the need of encrypting GEVs. Our key idea is to mix multiple flows at their intersection nodes by generating downstream GEVs from the common basis of upstream GEVs belonging to multiple flows, in order to hide the correlation of upstream and downstream GEVs in each flow. We then design a deterministic LNC scheme to implement our idea, by which the downstream GEVs produced are guaranteed to obfuscate their correlation with the corresponding upstream GEVs. We also give extensive theoretical analysis on the intersection probability of GEV bases and the influential factors to the effectiveness of our scheme, as well as the algorithm complexity to support its efficiency. © 2011 IEEE. | en_HK |
dc.language | eng | en_US |
dc.publisher | I E E E, Computer Society. The Journal's web site is located at http://www.ieee-infocom.org/ | en_HK |
dc.relation.ispartof | Proceedings of the IEEE INFOCOM | en_HK |
dc.subject | Algorithm complexity | - |
dc.subject | Anonymous communication | - |
dc.subject | Effective algorithms | - |
dc.subject | Influential factors | - |
dc.subject | ITS efficiencies | - |
dc.title | Anonymous communication with network coding against traffic analysis attack | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=0743-166X&volume=&spage=1008&epage=1016&date=2011&atitle=Anonymous+communication+with+network+coding+against+traffic+analysis+attack | - |
dc.identifier.email | Wu, C:cwu@cs.hku.hk | en_HK |
dc.identifier.authority | Wu, C=rp01397 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/INFCOM.2011.5934873 | en_HK |
dc.identifier.scopus | eid_2-s2.0-79960862937 | en_HK |
dc.identifier.hkuros | 187767 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-79960862937&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.spage | 1008 | en_HK |
dc.identifier.epage | 1016 | en_HK |
dc.publisher.place | United States | en_HK |
dc.description.other | The IEEE INFOCOM 2011, Shanghai, China, 10-15 April 2011. In Conference Proceedings, 2011, p. 1008-1016 | - |
dc.identifier.scopusauthorid | Wang, J=35087680000 | en_HK |
dc.identifier.scopusauthorid | Wang, J=35249657500 | en_HK |
dc.identifier.scopusauthorid | Wu, C=15836048100 | en_HK |
dc.identifier.scopusauthorid | Lu, K=7402892798 | en_HK |
dc.identifier.scopusauthorid | Gu, N=7102669753 | en_HK |
dc.identifier.issnl | 0743-166X | - |