DocumentCode :
1938119
Title :
Anonymous communication with network coding against traffic analysis attack
Author :
Wang, Jin ; Wang, Jianping ; Wu, Chuan ; Lu, Kejie ; Gu, Naijie
Author_Institution :
Dept. of Comput. Sci., City Univ. of Hong Kong, Hong Kong, China
fYear :
2011
fDate :
10-15 April 2011
Firstpage :
1008
Lastpage :
1016
Abstract :
Flow untraceability is one critical requirement for anonymous communication with network coding, which prevents malicious attackers with wiretapping and traffic analysis abilities from relating the senders to the receivers, using linear dependency of the received packets. There have recently been proposals advocating encryptions on the Global Encoding Vectors (GEV) of network coding to thwart such attacks. Nevertheless, there has been no exploration of the capability of networking coding itself, to constitute more efficient and effective algorithms which guarantee anonymity. In this paper, we design a novel, simple, and effective linear network coding mechanism (ALNCode) to achieve flow untraceability in a communication network with multiple unicast flows. With solid theoretical analysis, we first show that linear network coding (LNC) can be applied to thwart traffic analysis attacks without the need of encrypting GEVs. Our key idea is to mix multiple flows at their intersection nodes by generating downstream GEVs from the common basis of upstream GEVs belonging to multiple flows, in order to hide the correlation of upstream and downstream GEVs in each flow. We then design a deterministic LNC scheme to implement our idea, by which the downstream GEVs produced are guaranteed to obfuscate their correlation with the corresponding upstream GEVs. We also give extensive theoretical analysis on the intersection probability of GEV bases and the influential factors to the effectiveness of our scheme, as well as the algorithm complexity to support its efficiency.
Keywords :
linear codes; network coding; telecommunication security; telecommunication traffic; ALNCode; algorithm complexity; anonymous communication; communication network; downstream GEV; flow untraceability; global encoding vector; linear dependency; linear network coding; malicious attacker; multiple unicast flows; received packet; traffic analysis attack; upstream GEV; wiretapping; Correlation; Cryptography; Encoding; Network coding; Routing protocols; Unicast; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM, 2011 Proceedings IEEE
Conference_Location :
Shanghai
ISSN :
0743-166X
Print_ISBN :
978-1-4244-9919-9
Type :
conf
DOI :
10.1109/INFCOM.2011.5934873
Filename :
5934873
Link To Document :
بازگشت