Visible to the public Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance

TitleMitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance
Publication TypeConference Paper
Year of Publication2018
AuthorsHu, Y., Li, X., Liu, J., Ding, H., Gong, Y., Fang, Y.
Conference Name2018 IEEE International Conference on Communications (ICC)
ISBN Number978-1-5386-3180-5
KeywordsAd hoc networks, composability, data privacy, edge network assistance, flow routing optimization problem, identifying apps, MANET Attack Mitigation, Metrics, mobile ad hoc networks, mobile computing, multipath routing scheme, privacy, probability, pubcrawl, Relays, Resiliency, Routing, security, smart phones, smartphone apps, smartphone sales, smartphones, splitting traffic, telecommunication network routing, telecommunication security, telecommunication traffic, traffic analysis attack mitigation, traffic morphing, user security, Wireless sensor networks

With the growth of smartphone sales and app usage, fingerprinting and identification of smartphone apps have become a considerable threat to user security and privacy. Traffic analysis is one of the most common methods for identifying apps. Traditional countermeasures towards traffic analysis includes traffic morphing and multipath routing. The basic idea of multipath routing is to increase the difficulty for adversary to eavesdrop all traffic by splitting traffic into several subflows and transmitting them through different routes. Previous works in multipath routing mainly focus on Wireless Sensor Networks (WSNs) or Mobile Ad Hoc Networks (MANETs). In this paper, we propose a multipath routing scheme for smartphones with edge network assistance to mitigate traffic analysis attack. We consider an adversary with limited capability, that is, he can only intercept the traffic of one node following certain attack probability, and try to minimize the traffic an adversary can intercept. We formulate our design as a flow routing optimization problem. Then a heuristic algorithm is proposed to solve the problem. Finally, we present the simulation results for our scheme and justify that our scheme can effectively protect smartphones from traffic analysis attack.

Citation Keyhu_mitigating_2018