On the Perfect Privacy: A Statistical Analysis of Network Traffic Approach

Many recent studies reveal that merely encrypting the source content does not inhibit the adversary from gaining knowledge about the source's behavior. Thus, the adversary might be able to extract information from the network traffic by employing statistical analysis. Based on the information theory, in this letter, we quantify the amount of knowledge obtained by an adversary that overhears the channel. We present an approach that mixes the features of applications in the source node, such that it maximizes the ambiguity of adversary. Finally, we suggest three lower bounds of adversary's error probability.

[1]  Ken R. Duffy,et al.  Bounds on inference , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[2]  Seyed Pooya Shariatpanahi,et al.  A Dummy-Based Approach for Preserving Source Rate Privacy , 2016, IEEE Transactions on Information Forensics and Security.

[3]  George Kesidis An Introduction to Communication Network Analysis , 2007 .

[4]  Sergio Verdú,et al.  Generalizing the Fano inequality , 1994, IEEE Trans. Inf. Theory.

[5]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[6]  H. Vincent Poor,et al.  A lower bound on the probability of error in multihypothesis testing , 1995, IEEE Trans. Inf. Theory.

[7]  Andrew W. Moore,et al.  Discriminators for use in flow-based classification , 2013 .

[8]  Wenyuan Xu,et al.  Temporal privacy in wireless sensor networks: Theory and practice , 2009, TOSN.

[9]  George Kesidis An Introduction to Communication Network Analysis: Kesidis/An Introduction , 2007 .

[10]  Daryl J. Daley,et al.  Revisiting queueing output processes: a point process viewpoint , 2011, Queueing Syst. Theory Appl..

[11]  Mauro Conti,et al.  Providing Source Location Privacy in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[12]  Maurizio Dusi,et al.  Traffic classification through simple statistical fingerprinting , 2007, CCRV.

[13]  P. Burke The Output of a Queuing System , 1956 .