TU Darmstadt / ULB / TUbiblio

Cover Traffic: A Trade of Anonymity and Efficiency

Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
In: Lecture Notes in Computer Science, 10547, In: Security and Trust Management. STM 2017., pp. 213-223,
Oslo, Norway, Springer, 13th International Workshop on Security and Trust Management, Oslo, Norway, DOI: 10.1007/978-3-319-68063-7_15,
[Conference or Workshop Item]

Abstract

Communication is ubiquitous in societies, more and more devices participate in communication processes, as in for example the Internet of Things.&nbsp;<br />Due to the proximity to their users and the omnipresence of the communication itself, communication is sensitive w.r.t. to anonymity as even the process of communication can disclose information about the content of a communication. Anonymity gains more and more importance in the development of communication services.&nbsp;<br />Thus, anonymity in communication systems is a desired property in many scenarios, allowing to communicate without someone having the ability to attribute the communication to its senders and recipients.&nbsp;<br />However, sender anonymity, i.e., communication without having an identifiable source of information, is a hard goal and the only viable option to achieve it is cover traffic. Cover traffic blends communication in random noise. However, the generation of this noise degrades the efficiency of the system, in a worst case producing two times the number of connections messages to send just a single message.&nbsp;<br />Cover traffic as a technique is hardly understood and analyzed. For that, we derived a model of cover traffic with four parameters to vary the generation of noise in location, spread and time to achieve a better understanding of cover traffic. We analyze the impact of varying parameters on anonymity by computing the remaining cover and on efficiency by computing the noise to content ratio. Our results indicate that cover traffic can be generated in a more efficient way while anonymity is preserved on a reasonable level, yet, the parametrization randomizes the participation allowing to diminish anonymity in the long run.

Item Type: Conference or Workshop Item
Erschienen: 2017
Creators: Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max
Title: Cover Traffic: A Trade of Anonymity and Efficiency
Language: German
Abstract:

Communication is ubiquitous in societies, more and more devices participate in communication processes, as in for example the Internet of Things.&nbsp;<br />Due to the proximity to their users and the omnipresence of the communication itself, communication is sensitive w.r.t. to anonymity as even the process of communication can disclose information about the content of a communication. Anonymity gains more and more importance in the development of communication services.&nbsp;<br />Thus, anonymity in communication systems is a desired property in many scenarios, allowing to communicate without someone having the ability to attribute the communication to its senders and recipients.&nbsp;<br />However, sender anonymity, i.e., communication without having an identifiable source of information, is a hard goal and the only viable option to achieve it is cover traffic. Cover traffic blends communication in random noise. However, the generation of this noise degrades the efficiency of the system, in a worst case producing two times the number of connections messages to send just a single message.&nbsp;<br />Cover traffic as a technique is hardly understood and analyzed. For that, we derived a model of cover traffic with four parameters to vary the generation of noise in location, spread and time to achieve a better understanding of cover traffic. We analyze the impact of varying parameters on anonymity by computing the remaining cover and on efficiency by computing the noise to content ratio. Our results indicate that cover traffic can be generated in a more efficient way while anonymity is preserved on a reasonable level, yet, the parametrization randomizes the participation allowing to diminish anonymity in the long run.

Book Title: Security and Trust Management. STM 2017.
Series: Lecture Notes in Computer Science
Series Volume: 10547
Place of Publication: Oslo, Norway
Publisher: Springer
Uncontrolled Keywords: SPIN: Smart Protection in Infrastructures and Networks;- SST - Area Smart Security and Trust;- SSI - Area Secure Smart Infrastructures
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Telecooperation
DFG-Graduiertenkollegs
DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
Event Title: 13th International Workshop on Security and Trust Management
Event Location: Oslo, Norway
Date Deposited: 28 Jul 2017 13:57
DOI: 10.1007/978-3-319-68063-7_15
URL / URN: https://link.springer.com/chapter/10.1007/978-3-319-68063-7_...
Identification Number: TUD-CS-2017-0205
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details