Anonymity in Wireless Networks
Under Traffic Analysis Attacks
Hugo Moreira de Sousa Pinto
Professor Daniel Lucani
Professor João Barros
© 2005, it - instituto de telecomunicações. Todos os direitos reservados.
Security in Communications
Measures to deter violations that involve the transmission of information
Authentication
Access Control
Data Confidentiality
Data Integrity
Non Repudiation
Anonymity – hiding the parties involved in a communication
Wireless Networks
Session anonymity
Scheduling mechanisms
Dummy transmissions
Anonymity in Wireless Networks Under Traffic Analysis Attacks
2
IJUP - 18th February 2011
Problem Setup
A1
A2
A3
Wireless Line network
Possible sessions
A1 <-> A2
Types of sessions
Unicast Sessions:
e.g. VoIP conversation
A2 <-> A3
A1 <-> A3
A1
A2
A1 -> {A2 , A3}
A2 -> {A1 , A3}
A1 <-> A2
A3 -> {A1 , A2}
Multicast Sessions:
e.g. Sharing a picture
A1
A2
A1 -> {A2,A3}
Anonymity in Wireless Networks Under Traffic Analysis Attacks
3
IJUP - 18th February 2011
A3
Scheduling – 3 node line network
Pattern 1
Possible sessions
A1 <-> A2
A2 <-> A3
A1 <-> A3
A1
A1 -> {A2 , A3}
A3}
A2
A2 -> {A1 , A3}
A3}
t1
t2
t3
t4
x
x
x
x
A1
A2
A3
Not Anonymous
Pattern 2
A3
A3 -> {A1 , A2}
A2}
t1
A1
t2
t3
x
A2
x
A3
x
x
Anonymous
Anonymity in Wireless Networks Under Traffic Analysis Attacks
4
IJUP - 18th February 2011
t4
Design Objectives
Provide session anonymity
Scalable to longer networks
Maximize throughput
Minimize energy
Possibility of simultaneous transmissions
t1
A1
t2 t3 t4 t5 t6
X
A2
X
A3
X
X
X
A1
A4
A5
X
A2
A3
X
X
A6
X
X
Anonymity in Wireless Networks Under Traffic Analysis Attacks
5
IJUP - 18th February 2011
A4
A5
A6
Cost of anonymity
𝐶𝑜𝑠𝑡 𝑜𝑓 𝑎𝑛𝑜𝑛𝑦𝑚𝑖𝑡𝑦 𝑆𝑖 =
𝐶𝑜𝑠𝑡 𝑜𝑓 𝑆𝑖 𝑤𝑖𝑡ℎ 𝑎𝑛𝑜𝑛𝑦𝑚𝑖𝑡𝑦
𝐶𝑜𝑠𝑡 𝑜𝑓 𝑆𝑖 𝑤𝑖𝑡ℎ𝑜𝑢𝑡 𝑎𝑛𝑜𝑛𝑦𝑚𝑖𝑡𝑦
K=3
Unicast sessions: 𝐴𝑖
𝐴𝑖+𝑘
A1
4
3
2
1
0
A2
A3
A4
A5
Energy
0
5
10
K->
For k>=5 we have free anonymity
in terms of throughput
Cost
Cost
Throughput
50
40
30
20
10
0
N = 20
N = 30
N = 40
N = 50
0
10
K ->
Anonymity in Wireless Networks Under Traffic Analysis Attacks
6
IJUP - 18th February 2011
20
Conclusions and future work
Session anonymity
No cost in throughput
High cost in energy if the network size is too long
Use of transmission mechanisms such as network coding
Double throughput
Reduce energy consumption by half
Study trade-offs between anonymity and cost
Look into different network topologies
Anonymity in Wireless Networks Under Traffic Analysis Attacks
7
IJUP - 18th February 2011
© Copyright 2026 Paperzz