A Countermeasure for Traffic Analysis Attacks: Covert Communications With Digital Modulation

被引:8
|
作者
Topal, Ozan Alp [1 ]
Kurt, Gunes Karabulut [1 ]
机构
[1] Istanbul Tech Univ, Fac Elect & Elect Engn, TR-34467 Istanbul, Turkey
关键词
Digital modulation; Throughput; Wireless communication; Wireless sensor networks; Communication system security; Delays; Covert communication; delay-constrained networks; digital modulation; physical layer security; traffic analysis;
D O I
10.1109/LWC.2020.3034664
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this letter, we provide a physical layer supported defense mechanism against traffic analysis attacks by exploring the covert communication capability of digital modulation schemes. We analyze and compare the performances of M-PSK, M-QAM, M-ASK and M-APSK modulations in terms of the probability of detection by a warden and the maximum achievable throughput at the receiver. We obtain a lower bound for the covert transmission probability at Willie, which can be utilized as a covertness limit to maximize the throughput. Numerical studies highlight the tightness of the presented lower bound and show the maximum achievable throughput limits without being detected by a traffic analysis attacker.
引用
收藏
页码:441 / 445
页数:5
相关论文
共 50 条
  • [1] An effective countermeasure against traffic analysis attacks in wide area measurement systems
    Shafiei, H.
    Khonsari, A.
    Ould-Khaoua, Mohamed
    [J]. INFORMATION SYSTEMS, 2015, 53 : 182 - 189
  • [2] Countermeasure for collusion attacks against digital watermarking
    Steinebach, M
    Zmudzinski, S
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [3] Covert Communications Despite Traffic Data Retention
    Danezis, George
    [J]. SECURITY PROTOCOLS XVI, 2011, 6615 : 198 - 214
  • [4] Detection of Size Modulation Covert Channels Using Countermeasure Variation
    Wendzel, Steffen
    Link, Florian
    Eller, Daniela
    Mazurczyk, Wojciech
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (11) : 1396 - 1416
  • [5] Covert Communications Despite Traffic Data Retention (Transcript of Discussion)
    Danezis, George
    [J]. SECURITY PROTOCOLS XVI, 2011, 6615 : 215 - 219
  • [6] Covert communications using random noise signals: overall system simulation and modulation analysis
    Chuang, J
    Narayanan, RM
    [J]. Digital Wireless Communications VII and Space Communication Technologies, 2005, 5819 : 13 - 20
  • [7] Analysis and Countermeasure Design on Adversarial Patch Attacks
    Fu, Yinan
    Zheng, Xiaolong
    Du, Peilun
    Liu, Liang
    [J]. WIRELESS SENSOR NETWORKS (CWSN 2021), 2021, 1509 : 181 - 195
  • [8] Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure
    XiaoHang Wang
    ShouBin Li
    YingTao Jiang
    Amit Kumar Singh
    BiYun Ma
    LeTian Huang
    Mei Yang
    Fen Guo
    [J]. Journal of Electronic Science and Technology., 2022, 20 (04) - 415
  • [9] Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure
    Xiao-Hang Wang
    Shou-Bin Li
    Ying-Tao Jiang
    Amit Kumar Singh
    Bi-Yun Ma
    Le-Tian Huang
    Mei Yang
    Fen Guo
    [J]. Journal of Electronic Science and Technology, 2022, (04) : 396 - 415
  • [10] Optimal Covert Communications using Pulse-Position Modulation
    Bloch, Mathieu R.
    Guha, Saikat
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 2825 - 2829