Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communication

Anonymous communication systems have recently increased in popularity in wired networks, but there are no adequate equivalent systems for wireless networks under strong surveillance. In this work we evaluate the performance of delay-tolerant friend-to-friend networking, which can allow anonymous communication in a wireless medium under strong surveillance by relying on trust relationships between the network's users. Since strong anonymity properties incur in performance penalties, a good understanding of performance under various conditions is crucial for the successful deployment of such a system. We simulate a delay-tolerant friend-to-friend network in several scenarios using real-world mobility data, analyze the trade-offs of network-related parameters and offer a preliminary throughput estimation.

[1]  César A. Hidalgo,et al.  Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.

[2]  Elmar Gerhards-Padilla,et al.  BonnMotion: a mobility scenario generation and analysis tool , 2010, SimuTools.

[3]  Samir Khuller,et al.  On generalized gossiping and broadcasting , 2006, J. Algorithms.

[4]  Bülent Yener,et al.  On anonymity in an electronic society: A survey of anonymous communication systems , 2009, CSUR.

[5]  Arthur L. Liestman,et al.  A survey of gossiping and broadcasting in communication networks , 1988, Networks.

[6]  Ana Barroso aDTN - Undetectable Communication in Wireless Delay-tolerant Networks (Working Draft) , 2015, ArXiv.

[7]  Andrew S. Tanenbaum,et al.  Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.

[8]  A. Pfitzmann,et al.  A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .

[9]  Jean-Claude Bermond,et al.  Fast Gossiping by Short Messages , 1998, SIAM J. Comput..

[10]  Keith Marzullo,et al.  Gossip versus Deterministically Constrained Flooding on Small Networks , 2000, DISC.

[11]  Micah Sherr,et al.  Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks , 2012, ESORICS.

[12]  Imad Aad,et al.  The Mobile Data Challenge: Big Data for Mobile Computing Research , 2012 .

[13]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[14]  Kanchana Thilakarathna,et al.  Mobile social networking through friend-to-friend opportunistic content dissemination , 2013, MobiHoc '13.

[15]  Michael Rogers,et al.  How to Disappear Completely: A Survey of Private Peer-to-Peer Networks , 2007 .