Protecting Individuals by Hiding Flow Information on Last-mile Links

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

140 Downloads (Pure)

Abstract

Last-mile links connect a core network to the end-user’s communication infrastructure. A single user’s traffic can flow alone at a link, and thus an adversary can eavesdrop on the communication at the link, deducing critical information. Even if the traffic is encrypted, an aggressive enemy may perform statistical analysis based on the detected traffic. The results of this analysis may yield information in the communication that is private, characteristics of the communications, such as destination node or utilized networking protocols. With this information individual’s privacy can be damaged. In this paper we introduce a system that enhances remarkably user privacy on last mile links by making it more difficult for an adversary to perform statistical analysis. The system is based on one of the onion routing realizations Tor that is improved with the Traffic Flow Confidentiality (TFC) technique. Either a network operator or a service operator can deliver this service to customers. Moreover, we have measured the performance of our system that conceals flow information on last-mile link and beyond enhancing individual’s privacy.
Original languageEnglish
Title of host publication2018 7th International Conference on Computer and Communication Engineering (ICCCE)
PublisherIEEE
Pages141-146
ISBN (Electronic)978-1-5386-6992-1
DOIs
Publication statusPublished - 19 Sep 2018
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Computer and Communication Engineering: Innovative Technologies to Serve Humanity - Kulliyyah of Engineering, International Islamic University Malaysia, Kuala Lumpur, Malaysia
Duration: 19 Sep 201820 Sep 2018
Conference number: 7
http://www.iium.edu.my/iccce/18/

Conference

ConferenceInternational Conference on Computer and Communication Engineering
Abbreviated titleICCCE
CountryMalaysia
CityKuala Lumpur
Period19/09/201820/09/2018
Internet address

Keywords

  • network security
  • privacy
  • last-mile networking

Fingerprint

Dive into the research topics of 'Protecting Individuals by Hiding Flow Information on Last-mile Links'. Together they form a unique fingerprint.

Cite this