Title :
Preventing traffic analysis for real-time communication networks
Author :
Guan, Yong ; Li, Chengzhi ; Xuan, Dong ; Bettati, Riccardo ; Zhao, Wei
Author_Institution :
Dept. of Comput. Sci., Texas A&M Univ., College Station, TX, USA
fDate :
6/21/1905 12:00:00 AM
Abstract :
We address issues related to preventing traffic analysis in computer networks used for real time mission-critical applications. We consider an IP-based network where headers of packets, including source host address and destination host address, are readable by an observer (i.e., by a potential enemy). Although the encryption of network packets significantly increases privacy, the density of the traffic can still provide useful information to the observer. We take an approach by manipulating traffic in the network through host-based rerouting and traffic padding so that the traffic shows a time-invariant pattern. Thus, the observer can not derive any useful information about the real traffic pattern. By evaluating the performance of the algorithms used for this problem in terms of acceptance rate and execution time, we found that some well-known theoretical optimal and near-optimal algorithms failed to meet one or the other criteria. We present a heuristic method that can effectively prevent traffic analysis while at the same time meeting real-time requirements. Our algorithm generates a plan that specifies where and when the dummy packets should be transmitted and if and how the payload packets should be rerouted and can yield high acceptance rate with low execution time. The success of the algorithm stems from the fact that it explicitly takes into account the real-time requirements and properly balances the traffic over the links
Keywords :
computer networks; cryptography; data privacy; optimisation; packet switching; telecommunication network routing; telecommunication security; telecommunication traffic; transport protocols; IP-based network; acceptance rate; computer networks; destination host address; dummy packets transmission; enemy; execution time; heuristic method; host-based rerouting; near-optimal algorithms; network packets encryption; optimal algorithms; packet headers; payload packets; performance evaluation; privacy; real time mission-critical applications; real-time communication networks; source host address; time-invariant traffic pattern; traffic analysis prevention; traffic density; traffic padding; Application software; Communication networks; Communication system traffic control; Computer networks; Computer science; Cryptography; Mission critical systems; Payloads; Privacy; Telecommunication traffic;
Conference_Titel :
Military Communications Conference Proceedings, 1999. MILCOM 1999. IEEE
Conference_Location :
Atlantic City, NJ
Print_ISBN :
0-7803-5538-5
DOI :
10.1109/MILCOM.1999.822783