DocumentCode :
3265442
Title :
Subversion Impedance in Covert Communication Networks
Author :
Nix, T. ; Bettati, R.
Author_Institution :
Dept. of Comput. Sci. & Eng., Texas A&M Univ., College Station, TX, USA
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
458
Lastpage :
465
Abstract :
A covert communications network is a connected, overlay peer-to-peer network used to support communications within a group in which the survival of the group depends on: (1) anonymity of communications; and (2) concealment of network membership to both other members of the group and external eavesdroppers. These requirements are much more stringent than for typical privacy and anonymity systems. We consider the topologies of resilient covert communications networks that: (1) minimize the impact on the network in the event of a subverted node; and (2) maximize the connectivity of the survivor network with the removal of the subverted node and its closed neighborhood. We analyze the properties of resilient covert networks, propose a measurement for determining the suitability of a topology for use in a covert communication network, determine the properties of an optimal covert network topology, and analyze several optimal topologies.
Keywords :
computer network security; overlay networks; peer-to-peer computing; covert communication networks; external eavesdroppers; group eavesdroppers; network membership; optimal covert network topology; optimal topologies; overlay peer-to-peer network; subversion impedance; topology suitability; Communication networks; Impedance; Network topology; Peer to peer computing; Protocols; Servers; Topology; anonymity; covert; networks; peer-to-peer; privacy; resiliency; topology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
Type :
conf
DOI :
10.1109/TrustCom.2012.267
Filename :
6296008
Link To Document :
بازگشت