TY - JOUR
T1 - Anonymous networking amidst eavesdroppers
AU - Venkitasubramaniam, Parvathinathan
AU - He, Ting
AU - Tong, Lang
N1 - Funding Information:
Manuscript received February 16, 2007; revised October 1, 2007. This work is supported in part by the National Science Foundation under Awards CCF-0635070 and CCF-0728872, and the U. S. Army Research Laboratory under the Collaborative Technology Alliance Program DAAD19-01-2-0011. The material in this paper was presented in part at the 44th and 45th Annual Conferences on Communication, Control and Computing (Allerton 2006 and Allerton 2007), Monticello, IL.
PY - 2008/6/1
Y1 - 2008/6/1
N2 - The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of "anonymity"of routes in eavesdropped networks is proposed using the information-theoretic equivocation. For a physical layer with orthogonal transmitter directed signaling, scheduling and relaying techniques are designed to maximize achievable network performance for any desired level of anonymity. The network performance is measured by the total rate of packets delivered from the sources to destinations under strict latency and medium access constraints. In particular, analytical results are presented for two scenarios. For a single relay that forwards packets from m users, relaying strategies are provided that minimize the packet drops when the source nodes and the relay generate independent transmission schedules. A relay using such an independent scheduling strategy is undetectable by an eavesdropper and is referred to as a covert relay. Achievable rate regions are characterized under strict and average delay constraints on the traffic, when schedules are independent Poisson processes. For a multihop network with an arbitrary anonymity requirement, the problem of maximizing the sum-rate of flows (network throughput) is considered. A randomized selection strategy to choose covert relays as a function of the routes is designed for this purpose. Using the analytical results for a single covert relay, the strategy is optimized to obtain the maximum achievable throughput as a function of the desired level of anonymity. In particular, the throughput-anonymity relation for the proposed strategy is shown to be equivalent to an information-theoretic rate-distortion function.
AB - The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of "anonymity"of routes in eavesdropped networks is proposed using the information-theoretic equivocation. For a physical layer with orthogonal transmitter directed signaling, scheduling and relaying techniques are designed to maximize achievable network performance for any desired level of anonymity. The network performance is measured by the total rate of packets delivered from the sources to destinations under strict latency and medium access constraints. In particular, analytical results are presented for two scenarios. For a single relay that forwards packets from m users, relaying strategies are provided that minimize the packet drops when the source nodes and the relay generate independent transmission schedules. A relay using such an independent scheduling strategy is undetectable by an eavesdropper and is referred to as a covert relay. Achievable rate regions are characterized under strict and average delay constraints on the traffic, when schedules are independent Poisson processes. For a multihop network with an arbitrary anonymity requirement, the problem of maximizing the sum-rate of flows (network throughput) is considered. A randomized selection strategy to choose covert relays as a function of the routes is designed for this purpose. Using the analytical results for a single covert relay, the strategy is optimized to obtain the maximum achievable throughput as a function of the desired level of anonymity. In particular, the throughput-anonymity relation for the proposed strategy is shown to be equivalent to an information-theoretic rate-distortion function.
UR - http://www.scopus.com/inward/record.url?scp=45249083605&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=45249083605&partnerID=8YFLogxK
U2 - 10.1109/TIT.2008.921660
DO - 10.1109/TIT.2008.921660
M3 - Article
AN - SCOPUS:45249083605
SN - 0018-9448
VL - 54
SP - 2770
EP - 2784
JO - IEEE Transactions on Information Theory
JF - IEEE Transactions on Information Theory
IS - 6
ER -