It has been demonstrated that traffic analysis can disclose information supposedly secured by encrypted channels. Key feature of packetized traffic exploited to that purpose are packet lengths, inter-packet times, direction of packets. This work aims at assessing the overhead and delay implied by traffic masking algorithms that conceal the information leakage exploited by statistical traffic analysis. Traffic masking is obtained by reshaping packet lengths and inter-arrival times in a masking device. It is shown that the overhead-delay trade-off of the masking device is optimized by using circuit like traffic shaping, under the constraint of removing information leakage entirely (full privacy). Numerical examples are provided with real traffic traces both for full privacy and for a relaxed heuristic masking algorithm that leaks some information on packet lengths to mitigate the overhead. © 2013 IEEE.

Investigating the trade-off between overhead and delay for full packet traffic privacy / Iacovazzi, Alfonso; Baiocchi, Andrea. - (2013), pp. 1345-1350. (Intervento presentato al convegno 2013 IEEE International Conference on Communications Workshops, ICC 2013 tenutosi a Budapest; Hungary nel 9 June 2013 through 13 June 2013) [10.1109/iccw.2013.6649446].

Investigating the trade-off between overhead and delay for full packet traffic privacy

IACOVAZZI, ALFONSO;BAIOCCHI, Andrea
2013

Abstract

It has been demonstrated that traffic analysis can disclose information supposedly secured by encrypted channels. Key feature of packetized traffic exploited to that purpose are packet lengths, inter-packet times, direction of packets. This work aims at assessing the overhead and delay implied by traffic masking algorithms that conceal the information leakage exploited by statistical traffic analysis. Traffic masking is obtained by reshaping packet lengths and inter-arrival times in a masking device. It is shown that the overhead-delay trade-off of the masking device is optimized by using circuit like traffic shaping, under the constraint of removing information leakage entirely (full privacy). Numerical examples are provided with real traffic traces both for full privacy and for a relaxed heuristic masking algorithm that leaks some information on packet lengths to mitigate the overhead. © 2013 IEEE.
2013
2013 IEEE International Conference on Communications Workshops, ICC 2013
traffic masking; traffic analysis; traffic analysis; queueing; privacy; traffic masking; information leakage
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Investigating the trade-off between overhead and delay for full packet traffic privacy / Iacovazzi, Alfonso; Baiocchi, Andrea. - (2013), pp. 1345-1350. (Intervento presentato al convegno 2013 IEEE International Conference on Communications Workshops, ICC 2013 tenutosi a Budapest; Hungary nel 9 June 2013 through 13 June 2013) [10.1109/iccw.2013.6649446].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/526292
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 6
  • ???jsp.display-item.citation.isi??? 6
social impact