z-logo
Premium
Concurrent multipath traffic impersonating for enhancing communication privacy
Author(s) -
Liu Huisheng,
Wang Zhenxing,
Miao Fu
Publication year - 2014
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.2519
Subject(s) - eavesdropping , computer science , encryption , computer network , network packet , traffic analysis , computer security , multipath routing , multipath propagation , scheduling (production processes) , routing protocol , channel (broadcasting) , static routing , operations management , economics
Network communication traditionally only uses encryption techniques for privacy and a single path for routing, which makes the communication vulnerable to attackers. Attackers easily obtain much important information by eavesdropping on the path and analyzing the communication traffic. To overcome the problem, we propose concurrent multipath traffic impersonating (CMTI), which obscures traffic features by camouflaging the traffic flow and dividing it into multiple parts. We propose a traffic impersonating technique based on statistical simulation, which make the secret traffic look like another normal and inconspicuous class to deceive attackers. And we present the packet scheduling algorithm to transfer the impersonating flows on multipath, for enhancing the communication efficiency and further increasing significantly the cost inflicted on attackers who wish to eavesdrop communication sessions. The empirical analysis demonstrates that concurrent multipath traffic imitating can effectively thwart traffic analysis and enhance communication efficiency. Copyright © 2013 John Wiley & Sons, Ltd.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here