File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Packet cloaking: Protecting receiver privacy against traffic analysis

TitlePacket cloaking: Protecting receiver privacy against traffic analysis
Authors
KeywordsInternet
Internet protocols
Network protocols
Experimental evaluations
Metrics (co)
Issue Date2007
PublisherIEEE.
Citation
The 3rd IEEE Workshop on Secure Network Protocols (NPSec) 2007, Beijing, China, 16 October 2007. In Proceedings of the 3rd NPSec, 2007, p. 37-42 How to Cite?
AbstractWith widespread use of the Internet, there is an increase in concern over users' privacy. In particular, an adversary may identify the receiver involved in a communication session by observing the packet traffic. We propose a new routing mechanism, which we call packet cloaking, to protect the privacy of a receiver. The main idea of packet cloaking is to transmit multiple copies of a sent packet to a selected group of k receivers, so that an adversary may only identify the true receiver with a probability of 1/k. We present the system design to support packet cloaking. We also propose two metrics that measure the receiver privacy, based on evaluating the similarity between the sender/receiver traffic patterns. We have performed experimental evaluations to verify the effectiveness of our approach.
Persistent Identifierhttp://hdl.handle.net/10722/129578
References

 

DC FieldValueLanguage
dc.contributor.authorCheng, Ren_HK
dc.contributor.authorYau, DKYen_HK
dc.contributor.authorFu, Jen_HK
dc.date.accessioned2010-12-23T08:39:26Z-
dc.date.available2010-12-23T08:39:26Z-
dc.date.issued2007en_HK
dc.identifier.citationThe 3rd IEEE Workshop on Secure Network Protocols (NPSec) 2007, Beijing, China, 16 October 2007. In Proceedings of the 3rd NPSec, 2007, p. 37-42en_HK
dc.identifier.urihttp://hdl.handle.net/10722/129578-
dc.description.abstractWith widespread use of the Internet, there is an increase in concern over users' privacy. In particular, an adversary may identify the receiver involved in a communication session by observing the packet traffic. We propose a new routing mechanism, which we call packet cloaking, to protect the privacy of a receiver. The main idea of packet cloaking is to transmit multiple copies of a sent packet to a selected group of k receivers, so that an adversary may only identify the true receiver with a probability of 1/k. We present the system design to support packet cloaking. We also propose two metrics that measure the receiver privacy, based on evaluating the similarity between the sender/receiver traffic patterns. We have performed experimental evaluations to verify the effectiveness of our approach.en_HK
dc.languageengen_US
dc.publisherIEEE.-
dc.relation.ispartofProceedings of the IEEE Workshop on Secure Network Protocols, NPSec 2007en_HK
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License-
dc.rightsIEEE Workshop on Secure Network Protocols. Copyright © IEEE.-
dc.rights©2007 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.-
dc.subjectInternet-
dc.subjectInternet protocols-
dc.subjectNetwork protocols-
dc.subjectExperimental evaluations-
dc.subjectMetrics (co)-
dc.titlePacket cloaking: Protecting receiver privacy against traffic analysisen_HK
dc.typeConference_Paperen_HK
dc.identifier.emailCheng, R:ckcheng@cs.hku.hken_HK
dc.identifier.authorityCheng, R=rp00074en_HK
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.1109/NPSEC.2007.4371622en_HK
dc.identifier.scopuseid_2-s2.0-47249090110en_HK
dc.identifier.hkuros176466en_US
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-47249090110&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.spage37en_HK
dc.identifier.epage42en_HK
dc.description.otherThe 3rd IEEE Workshop on Secure Network Protocols (NPSec) 2007, Beijing, China, 16 October 2007. In Proceedings of the 3rd NPSec, 2007, p. 37-42-
dc.identifier.scopusauthoridCheng, R=7201955416en_HK
dc.identifier.scopusauthoridYau, DKY=34980075000en_HK
dc.identifier.scopusauthoridFu, J=24468070400en_HK

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats