Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
In: Lecture Notes in Computer Science, 10547, In: Security and Trust Management. STM 2017., pp. 213-223,
Oslo, Norway, Springer, 13th International Workshop on Security and Trust Management, Oslo, Norway, DOI: 10.1007/978-3-319-68063-7_15,
[Conference or Workshop Item]
Abstract
Communication is ubiquitous in societies, more and more devices participate in communication processes, as in for example the Internet of Things. <br />Due to the proximity to their users and the omnipresence of the communication itself, communication is sensitive w.r.t. to anonymity as even the process of communication can disclose information about the content of a communication. Anonymity gains more and more importance in the development of communication services. <br />Thus, anonymity in communication systems is a desired property in many scenarios, allowing to communicate without someone having the ability to attribute the communication to its senders and recipients. <br />However, sender anonymity, i.e., communication without having an identifiable source of information, is a hard goal and the only viable option to achieve it is cover traffic. Cover traffic blends communication in random noise. However, the generation of this noise degrades the efficiency of the system, in a worst case producing two times the number of connections messages to send just a single message. <br />Cover traffic as a technique is hardly understood and analyzed. For that, we derived a model of cover traffic with four parameters to vary the generation of noise in location, spread and time to achieve a better understanding of cover traffic. We analyze the impact of varying parameters on anonymity by computing the remaining cover and on efficiency by computing the noise to content ratio. Our results indicate that cover traffic can be generated in a more efficient way while anonymity is preserved on a reasonable level, yet, the parametrization randomizes the participation allowing to diminish anonymity in the long run.
Item Type: | Conference or Workshop Item |
---|---|
Erschienen: | 2017 |
Creators: | Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max |
Title: | Cover Traffic: A Trade of Anonymity and Efficiency |
Language: | German |
Abstract: | Communication is ubiquitous in societies, more and more devices participate in communication processes, as in for example the Internet of Things. <br />Due to the proximity to their users and the omnipresence of the communication itself, communication is sensitive w.r.t. to anonymity as even the process of communication can disclose information about the content of a communication. Anonymity gains more and more importance in the development of communication services. <br />Thus, anonymity in communication systems is a desired property in many scenarios, allowing to communicate without someone having the ability to attribute the communication to its senders and recipients. <br />However, sender anonymity, i.e., communication without having an identifiable source of information, is a hard goal and the only viable option to achieve it is cover traffic. Cover traffic blends communication in random noise. However, the generation of this noise degrades the efficiency of the system, in a worst case producing two times the number of connections messages to send just a single message. <br />Cover traffic as a technique is hardly understood and analyzed. For that, we derived a model of cover traffic with four parameters to vary the generation of noise in location, spread and time to achieve a better understanding of cover traffic. We analyze the impact of varying parameters on anonymity by computing the remaining cover and on efficiency by computing the noise to content ratio. Our results indicate that cover traffic can be generated in a more efficient way while anonymity is preserved on a reasonable level, yet, the parametrization randomizes the participation allowing to diminish anonymity in the long run. |
Book Title: | Security and Trust Management. STM 2017. |
Series: | Lecture Notes in Computer Science |
Series Volume: | 10547 |
Place of Publication: | Oslo, Norway |
Publisher: | Springer |
Uncontrolled Keywords: | SPIN: Smart Protection in Infrastructures and Networks;- SST - Area Smart Security and Trust;- SSI - Area Secure Smart Infrastructures |
Divisions: | 20 Department of Computer Science 20 Department of Computer Science > Telecooperation DFG-Graduiertenkollegs DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users Profile Areas Profile Areas > Cybersecurity (CYSEC) |
Event Title: | 13th International Workshop on Security and Trust Management |
Event Location: | Oslo, Norway |
Date Deposited: | 28 Jul 2017 13:57 |
DOI: | 10.1007/978-3-319-68063-7_15 |
URL / URN: | https://link.springer.com/chapter/10.1007/978-3-319-68063-7_... |
Identification Number: | TUD-CS-2017-0205 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
![]() |
Send an inquiry |
Options (only for editors)
![]() |
Show editorial Details |