End-to-end Flow Inference of Encrypted MANET

被引:0
|
作者
Chang, Huijun [1 ]
Shan, Hong [1 ]
机构
[1] Inst Elect Engn, Dept Network Engn, Hefei 23003, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing traffic analysis techniques are limited by the application environment and data rate when the end-to-end encryption and link encryption are both employed in mobile Ad Hoc networks (MANETs). An end-to-end traffic analysis algorithm is proposed based on time sequence matching and correlation analysis in this paper. According to the characteristics of data flow, the algorithm adopts time sequence matching, correlation analysis, and flow tracer to find the end-to-end flow in the network. The method can infer the traffic pattern without decrypting the frames. Simulation results proved the effectiveness of the method.
引用
收藏
页码:1104 / 1109
页数:6
相关论文
共 50 条
  • [1] Traceback for End-to-End Encrypted Messaging
    Tyagi, Nirvan
    Miers, Ian
    Ristenpart, Thomas
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
  • [2] End-to-End Encrypted Cloud Storage
    Backendal, Matilda
    Haller, Miro
    Paterson, Kenny
    [J]. IEEE SECURITY & PRIVACY, 2024, 22 (02) : 69 - 74
  • [3] End-to-End Encrypted Messaging Protocols: An Overview
    Ermoshina, Ksenia
    Musiani, Francesca
    Halpin, Harry
    [J]. INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254
  • [4] End-to-end Learning for Encrypted Image Retrieval
    Feng, Qihua
    Li, Peiya
    Lu, ZhiXun
    Liu, Guan
    Huang, Feiran
    [J]. 2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 1839 - 1845
  • [5] Enhanced Certificate Transparency and End-to-end Encrypted Mail
    Ryan, Mark D.
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [6] An end-to-end packet delay optimization for QoS in a MANET
    Kim, Sang-Chul
    [J]. Embedded Software and Systems, Proceedings, 2007, 4523 : 653 - 663
  • [7] Voice End-to-End Encrypted for TETRA Radiocommunication System
    Buric, Marian
    [J]. PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 419 - 422
  • [8] Snake: an End-to-End Encrypted Online Social Network
    Barenghi, Alessandro
    Beretta, Michele
    Di Federico, Alessandro
    Pelosi, Gerardo
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 763 - 770
  • [9] End-to-End Hierarchical Fuzzy Inference Solution
    Mutlu, Begum
    Sezer, Ebru A.
    Akcayol, M. Ali
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2018,
  • [10] Session key agreement protocol for end-to-end security in MANET
    Lim, Jeong-Mi
    Park, Chang-Seop
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 679 - 686