Anonymous networking amidst eavesdroppers

被引:50
|
作者
Venkitasubramaniam, Parvathinathan [1 ]
He, Ting [2 ]
Tong, Lang [1 ]
机构
[1] Cornell Univ, Dept Elect & Comp Engn, Ithaca, NY 14853 USA
[2] IBM Corp, TJ Watson Res Ctr, Hawthorne, NY 14853 USA
基金
美国国家科学基金会;
关键词
anonymity; equivocation; network security; rate-distortion; traffic analysis;
D O I
10.1109/TIT.2008.921660
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of "anonymity" of routes in eavesdropped networks is proposed using the information-theoretic equivocation. For a physical layer with orthogonal transmitter directed signaling, scheduling and relaying techniques are designed to maximize achievable network performance for any desired level of anonymity. The network performance is measured by the total rate of packets delivered from the sources to destinations under strict latency and medium access constraints. In particular, analytical results are presented for two scenarios: For a single relay that forwards packets from m users, relaying strategies are provided that minimize the packet drops when the source nodes and the relay generate independent transmission schedules. A relay using such an independent scheduling strategy is undetectable by an eavesdropper and is referred to as a covert relay. Achievable rate regions are characterized under strict and average delay constraints on the traffic, when schedules are independent Poisson processes. For a multihop network with an arbitrary anonymity requirement, the problem of maximizing the sum-rate of flows (network throughput) is considered. A randomized selection strategy to choose covert relays as a function of the routes is designed for this purpose. Using the analytical results for a single covert relay, the strategy is optimized to obtain the maximum achievable throughput as a function of the desired level of anonymity. In particular, the throughput-anonymity relation for the proposed strategy is shown to be equivalent to an information-theoretic rate-distortion function.
引用
收藏
页码:2770 / 2784
页数:15
相关论文
共 50 条
  • [1] Anonymous Networking amidst Active Adversaries
    Venkitasubramaniam, Parv
    Tong, Lang
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 2543 - +
  • [2] Anonymous Networking with Localized Eavesdroppers: A Game-Theoretic Approach
    Venkitasubramaniam, Parv
    Tong, Lang
    2009 43RD ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2009, : 278 - 283
  • [3] Towards a Theory of Anonymous Networking
    Ghaderi, J.
    Srikant, R.
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [4] GAP - Practical anonymous networking
    Bennett, K
    Grothoff, C
    PRIVACY ENHANCING TECHNOLOGIES, 2003, 2760 : 141 - 160
  • [5] Anonymous Networking under Memory Constraints
    Venkitasubramaniam, Parv
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [6] Secure Rate Maximization for ISAC-UAV Assisted Communication Amidst Multiple Eavesdroppers
    Liu, Yuemin
    Liu, Xin
    Liu, Zechen
    Yu, Yingfeng
    Jia, Min
    Na, Zhenyu
    Durrani, Tariq S.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (10) : 15843 - 15847
  • [7] Toward an analytical approach to anonymous wireless networking
    Venkitasubramaniam, Parv
    He, Ting
    Tong, Lang
    Wicker, Stephen B.
    IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (02) : 140 - 146
  • [8] ARDEN: Anonymous networking in delay tolerant networks
    Shi, Cong
    Luo, Xiapu
    Traynor, Patrick
    Ammar, Mostafa H.
    Zegura, Ellen W.
    AD HOC NETWORKS, 2012, 10 (06) : 918 - 930
  • [9] Anonymous Communication and its Importance in Social Networking
    Nguyen Phong Hoang
    Pishva, Davar
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 34 - 39
  • [10] Anonymous Authentication for Trustworthy Pervasive Social Networking
    Yan, Zheng
    Feng, Wei
    Wang, Pu
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2015, 2 (03): : 88 - 98