Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping

@article{Zhang2011DefendingAT,
  title={Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping},
  author={Fan Zhang and Wenbo He and Xue Liu},
  journal={2011 31st International Conference on Distributed Computing Systems},
  year={2011},
  pages={593-602}
}
Traffic analysis has been exploited by attackers to threaten user privacy in wireless networks. As an example, a user's on line activities may be exposed to strangers, even if the traffic is encrypted. However, the existing defense mechanisms against traffic analysis, such as packet padding and traffic morphing, are inefficient because they add noise traffic to blur the traffic features, therefore introducing significant overhead. In this paper, we propose the traffic reshaping technique to… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 16 CITATIONS

Wireless/Website Traffic Analysis & Fingerprinting: A Survey of Attacking Techniques and Countermeasures

  • 2015 International Conference on Cloud Computing (ICCC)
  • 2015
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Virtual MAC Spoofing Detection through Deep Learning

  • 2018 IEEE International Conference on Communications (ICC)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

Circumvent traffic shaping using virtual wireless clients in IEEE 802.11 wireless local area network

  • MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)
  • 2017
VIEW 1 EXCERPT
CITES METHODS

Optical Signal Processing and Stealth Transmission for Privacy

  • IEEE Journal of Selected Topics in Signal Processing
  • 2015
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 33 REFERENCES

Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow

  • 2010 IEEE Symposium on Security and Privacy
  • 2010
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Statistical identification of encrypted Web browsing traffic

  • Proceedings 2002 IEEE Symposium on Security and Privacy
  • 2002
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Jamming for good: design and analysis of a crypto-less protection for WSNs

I. Martinovic, P. Pichota, J. B. Schmitt
  • In Proceedings of WiSec,
  • 2009
VIEW 1 EXCERPT