Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Publication date | 15/08/2005 |
---|---|
Host publication | IEEE International Conference on Communications, 2005: ICC 2005 |
Publisher | IEEE |
Pages | 1518-1523 |
Number of pages | 6 |
Volume | 3 |
ISBN (print) | 0780389387 |
<mark>Original language</mark> | English |
Event | 2005 IEEE International Conference on Communications, ICC 2005 - Seoul, Korea, Republic of Duration: 16/05/2005 → 20/05/2005 |
Conference | 2005 IEEE International Conference on Communications, ICC 2005 |
---|---|
Country/Territory | Korea, Republic of |
City | Seoul |
Period | 16/05/05 → 20/05/05 |
Name | IEEE International Conference on Communications |
---|---|
ISSN (Print) | 0536-1486 |
Conference | 2005 IEEE International Conference on Communications, ICC 2005 |
---|---|
Country/Territory | Korea, Republic of |
City | Seoul |
Period | 16/05/05 → 20/05/05 |
This paper proposes a novel mechanism to enhance data protection in communications across untrusted networks. The approach is based on the principle of network address hopping, whereby a data stream is spread across multiple end-to-end connections. The aim is to obscure the data exchange between two peers by shuffling the communication pattern. The hopping pattern - a shared secret between the communication participants -defines the sequence for the address hopping and determines the data spreading. Besides a description of the basic operation of the network address hopping mechanism, the paper evaluates the level of protection it can offer for end-to-end communications. This theoretical analysis is accompanied by a quantitative evaluation of the processing overhead of our prototype implementation on commodity end hosts.