On flow marking attacks in wireless anonymous communication networks

被引:19
|
作者
Fu, XW [1 ]
Zhu, Y [1 ]
Graham, B [1 ]
Bettati, R [1 ]
Zhao, W [1 ]
机构
[1] Texas A&M Univ, Dept Comp Sci, College Stn, TX 77843 USA
关键词
D O I
10.1109/ICDCS.2005.55
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper studies the degradation of anonymity in a flow-based wireless mix network under flow marking attacks, in which an adversary embeds a recognizable pattern of marks into wireless traffic flows by electromagnetic interference. We find that traditional mix technologies are not effective in defeating flow marking attacks, and it may take an adversary only a few seconds to recognize the communication relationship between hosts by tracking such artificial marks. Flow marking attacks utilize frequency domain analytical techniques and convert time domain marks into invariant feature frequencies. To counter flow marking attacks, we propose a new countermeasure based on digital filtering technology, and show that this filter-based countermeasure can effectively defend a wireless mix network from flow marking attacks.
引用
收藏
页码:493 / 503
页数:11
相关论文
共 50 条
  • [1] Optimized Flow Allocation for Anonymous Communication in Multipath Wireless Networks
    Yang, Chouchang
    Alomair, Basel
    Poovendran, Radha
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012, : 219 - 223
  • [2] An Analysis of Attacks Against Anonymous Communication Networks
    Lu, Tianbo
    Yao, Puxin
    Zhao, Lingling
    Li, Yang
    Xie, Feng
    Xia, Yamei
    2014 7th International Conference on Security Technology (SecTech), 2014, : 38 - 40
  • [3] Anonymous Communication in Multi Hop Wireless Networks
    Fusenig, Volker
    Spiewak, Dagmara
    Engel, Thomas
    JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2008, 40 (03): : 207 - 225
  • [4] An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks
    Sen, Jaydip
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 580 - 592
  • [5] An efficient anonymous communication protocol for wireless sensor networks
    Chen, Juan
    Du, Xiaojiang
    Fang, Binxing
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2012, 12 (14): : 1302 - 1312
  • [6] Detecting anonymous attacks in wireless communication medium using adaptive grasshopper optimization algorithm
    Dwivedi, Shubhra
    COGNITIVE SYSTEMS RESEARCH, 2021, 69 : 1 - 21
  • [7] Multipath Flow Allocation in Anonymous Wireless Networks with Dependent Sources
    Yang, Chouchang
    Alomair, Basel
    Poovendran, Radha
    2012 50TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2012, : 1395 - 1400
  • [8] Acimn protocol: A protocol for anonymous communication in multi hop wireless networks
    University of Luxembourg, Facult´e des Sciences, de la Technologie et de la Communication, 6, rue Richard Coudenhove-Kalergi, L-1359 Luxembourg, Luxembourg
    Conf. Res. Pract. Inf. Technol. Ser., 2008, (107-114):
  • [9] Acimn protocol: A protocol for anonymous communication in multi hop wireless networks
    Fusenig, Volker
    Spiewak, Dagmara
    Engel, Thomas
    2007 WIRELESS TELECOMMUNICATIONS SYMPOSIUM, 2007, : 175 - 175
  • [10] Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks
    Wan, Zhiguo
    Ren, Kui
    Zhu, Bo
    Preneel, Bart
    Gu, Ming
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (02) : 519 - 532