Network communication traditionally only uses encryption techniques for privacy and a single path for routing, which makes the communication vulnerable to attackers. Attackers easily obtain much important information by eavesdropping on the path and analyzing the communication traffic. To overcome the problem, we propose concurrent multipath traffic impersonating (CMTI), which obscures traffic features by camouflaging the traffic flow and dividing it into multiple parts. We propose a traffic impersonating technique based on statistical simulation, which make the secret traffic look like another normal and inconspicuous class to deceive attackers. And we present the packet scheduling algorithm to transfer the impersonating flows on multipath, for enhancing the communication efficiency and further increasing significantly the cost inflicted on attackers who wish to eavesdrop communication sessions. The empirical analysis demonstrates that concurrent multipath traffic imitating can effectively thwart traffic analysis and enhance communication efficiency. Copyright © 2013 John Wiley & Sons, Ltd.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.