{"title":"End-to-end flow inference of encrypted MANET","authors":"Huijun Chang, Hong Shan","doi":"10.1109/ICIST.2013.6747729","DOIUrl":null,"url":null,"abstract":"Existing traffic analysis techniques are limited by the application environment and data rate when the end-to-end encryption and link encryption are both employed in mobile Ad Hoc networks (MANETs). An end-to-end traffic analysis algorithm is proposed based on time sequence matching and correlation analysis in this paper. According to the characteristics of data flow, the algorithm adopts time sequence matching, correlation analysis, and flow tracer to find the end-to-end flow in the network. The method can infer the traffic pattern without decrypting the frames. Simulation results proved the effectiveness of the method.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIST.2013.6747729","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Existing traffic analysis techniques are limited by the application environment and data rate when the end-to-end encryption and link encryption are both employed in mobile Ad Hoc networks (MANETs). An end-to-end traffic analysis algorithm is proposed based on time sequence matching and correlation analysis in this paper. According to the characteristics of data flow, the algorithm adopts time sequence matching, correlation analysis, and flow tracer to find the end-to-end flow in the network. The method can infer the traffic pattern without decrypting the frames. Simulation results proved the effectiveness of the method.