Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance
Title | Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Hu, Y., Li, X., Liu, J., Ding, H., Gong, Y., Fang, Y. |
Conference Name | 2018 IEEE International Conference on Communications (ICC) |
ISBN Number | 978-1-5386-3180-5 |
Keywords | Ad hoc networks, composability, data privacy, edge network assistance, flow routing optimization problem, identifying apps, MANET Attack Mitigation, Metrics, mobile ad hoc networks, mobile computing, multipath routing scheme, privacy, probability, pubcrawl, Relays, Resiliency, Routing, security, smart phones, smartphone apps, smartphone sales, smartphones, splitting traffic, telecommunication network routing, telecommunication security, telecommunication traffic, traffic analysis attack mitigation, traffic morphing, user security, Wireless sensor networks |
Abstract | With the growth of smartphone sales and app usage, fingerprinting and identification of smartphone apps have become a considerable threat to user security and privacy. Traffic analysis is one of the most common methods for identifying apps. Traditional countermeasures towards traffic analysis includes traffic morphing and multipath routing. The basic idea of multipath routing is to increase the difficulty for adversary to eavesdrop all traffic by splitting traffic into several subflows and transmitting them through different routes. Previous works in multipath routing mainly focus on Wireless Sensor Networks (WSNs) or Mobile Ad Hoc Networks (MANETs). In this paper, we propose a multipath routing scheme for smartphones with edge network assistance to mitigate traffic analysis attack. We consider an adversary with limited capability, that is, he can only intercept the traffic of one node following certain attack probability, and try to minimize the traffic an adversary can intercept. We formulate our design as a flow routing optimization problem. Then a heuristic algorithm is proposed to solve the problem. Finally, we present the simulation results for our scheme and justify that our scheme can effectively protect smartphones from traffic analysis attack. |
URL | https://ieeexplore.ieee.org/document/8422190 |
DOI | 10.1109/ICC.2018.8422190 |
Citation Key | hu_mitigating_2018 |
- Resiliency
- wireless sensor networks
- user security
- traffic morphing
- traffic analysis attack mitigation
- telecommunication traffic
- telecommunication security
- telecommunication network routing
- splitting traffic
- Smartphones
- smartphone sales
- smartphone apps
- smart phones
- security
- Routing
- Ad hoc networks
- Relays
- pubcrawl
- probability
- privacy
- multipath routing scheme
- mobile computing
- mobile ad hoc networks
- Metrics
- MANET Attack Mitigation
- identifying apps
- flow routing optimization problem
- edge network assistance
- data privacy
- composability