2014
DOI: 10.1109/tpds.2013.42
|View full text |Cite
|
Sign up to set email alerts
|

Internet Traffic Privacy Enhancement with Masking: Optimization and Tradeoffs

Abstract: An increasing number of recent experimental works have demonstrated that the supposedly secure channels in the Internet are prone to privacy breaking under many respects, due to packet traffic features leaking information on the user activity and traffic content. We aim at understanding if and how complex it is to obfuscate the information leaked by packet traffic features, namely packet lengths, directions, and times: we call this technique traffic masking. We define a security model that points out what the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(2 citation statements)
references
References 12 publications
(15 reference statements)
0
2
0
Order By: Relevance
“…To improve the authentication performance, we may utilize multi-dimensional attributes in higher layers (e.g., application layer) and explore more precise information of Alice, but her privacy may not be guaranteed. In other words, Bob may collect Alice's information, such as user behaviors and location-related features, for analyzing her habits, locations, and other sensitive information during the authentication process, thus leading to privacy leakage [9]. Hence, developing a privacy preserving authentication scheme based on the masking methods [14] is helpful in protecting Alice's private information during the authentication process by adding obfuscation patterns on attribute measurements.…”
Section: Supervised Learning Algorithmsmentioning
confidence: 99%
“…To improve the authentication performance, we may utilize multi-dimensional attributes in higher layers (e.g., application layer) and explore more precise information of Alice, but her privacy may not be guaranteed. In other words, Bob may collect Alice's information, such as user behaviors and location-related features, for analyzing her habits, locations, and other sensitive information during the authentication process, thus leading to privacy leakage [9]. Hence, developing a privacy preserving authentication scheme based on the masking methods [14] is helpful in protecting Alice's private information during the authentication process by adding obfuscation patterns on attribute measurements.…”
Section: Supervised Learning Algorithmsmentioning
confidence: 99%
“…The creator proposed an enhanced movement for veiling calculation. It evacuates any spilling in [8]. A strategy to discover the DOS assaults in VANETs is proposed.…”
Section: Literature Surveymentioning
confidence: 99%