A Countermeasure for Traffic Analysis Attacks: Covert Communications With Digital Modulation

被引:8
|
作者
Topal, Ozan Alp [1 ]
Kurt, Gunes Karabulut [1 ]
机构
[1] Istanbul Tech Univ, Fac Elect & Elect Engn, TR-34467 Istanbul, Turkey
关键词
Digital modulation; Throughput; Wireless communication; Wireless sensor networks; Communication system security; Delays; Covert communication; delay-constrained networks; digital modulation; physical layer security; traffic analysis;
D O I
10.1109/LWC.2020.3034664
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this letter, we provide a physical layer supported defense mechanism against traffic analysis attacks by exploring the covert communication capability of digital modulation schemes. We analyze and compare the performances of M-PSK, M-QAM, M-ASK and M-APSK modulations in terms of the probability of detection by a warden and the maximum achievable throughput at the receiver. We obtain a lower bound for the covert transmission probability at Willie, which can be utilized as a covertness limit to maximize the throughput. Numerical studies highlight the tightness of the presented lower bound and show the maximum achievable throughput limits without being detected by a traffic analysis attacker.
引用
收藏
页码:441 / 445
页数:5
相关论文
共 50 条
  • [41] Quadratic Chirp Modulation for Underwater Acoustic Digital Communications
    Carvallo Pecci, Andres
    Laot, Christophe
    Bourre, Arnaud
    [J]. OCEANS 2015 - GENOVA, 2015,
  • [42] Precise lightwave modulation for digital and analogue optical communications
    Kawanishi, Tetsuya
    [J]. 2013 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED INFOCOMM TECHNOLOGY (ICAIT), 2013, : 207 - 208
  • [43] Optimal Jamming Strategies in Digital Communications - Impact of Modulation
    Amuru, SaiDhiraj
    Buehrer, R. Michael
    [J]. 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 1619 - 1624
  • [44] Analytical and empirical analysis of countermeasures to traffic analysis attacks
    Fu, XW
    Graham, B
    Bettati, R
    Zhao, W
    [J]. 2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS, 2003, : 483 - 492
  • [45] DIGITAL AIR GROUND COMMUNICATIONS FOR AIR-TRAFFIC-CONTROL
    HOWLAND, JW
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 1994, 9 (04) : 20 - 24
  • [46] A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis
    Sun, Xiaoshan
    Cheng, Liang
    Zhang, Yang
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [47] Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications
    Al-Eidi, Shorouq
    Darwish, Omar
    Chen, Yuanzhu
    [J]. SENSORS, 2020, 20 (08)
  • [48] The web browser factor in traffic analysis attacks
    Zhioua, Sami
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4227 - 4241
  • [49] Traffic analysis attacks on Skype VoIP calls
    Zhu, Ye
    Fub, Huirong
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (10) : 1202 - 1212
  • [50] POSTER: Traffic Analysis Attacks in Anonymity Networks
    Kohis, Katharina
    Popper, Christina
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 917 - 919