Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Network address hopping
T2 - 2005 IEEE International Conference on Communications, ICC 2005
AU - Sifalakis, Manolis
AU - Schmid, Stefan
AU - Hutchison, David
PY - 2005/8/15
Y1 - 2005/8/15
N2 - This paper proposes a novel mechanism to enhance data protection in communications across untrusted networks. The approach is based on the principle of network address hopping, whereby a data stream is spread across multiple end-to-end connections. The aim is to obscure the data exchange between two peers by shuffling the communication pattern. The hopping pattern - a shared secret between the communication participants -defines the sequence for the address hopping and determines the data spreading. Besides a description of the basic operation of the network address hopping mechanism, the paper evaluates the level of protection it can offer for end-to-end communications. This theoretical analysis is accompanied by a quantitative evaluation of the processing overhead of our prototype implementation on commodity end hosts.
AB - This paper proposes a novel mechanism to enhance data protection in communications across untrusted networks. The approach is based on the principle of network address hopping, whereby a data stream is spread across multiple end-to-end connections. The aim is to obscure the data exchange between two peers by shuffling the communication pattern. The hopping pattern - a shared secret between the communication participants -defines the sequence for the address hopping and determines the data spreading. Besides a description of the basic operation of the network address hopping mechanism, the paper evaluates the level of protection it can offer for end-to-end communications. This theoretical analysis is accompanied by a quantitative evaluation of the processing overhead of our prototype implementation on commodity end hosts.
KW - Data Protection
KW - Network Address Hopping
KW - Secure Communication
KW - Security Enhancements
U2 - 10.1109/ICC.2005.1494598
DO - 10.1109/ICC.2005.1494598
M3 - Conference contribution/Paper
AN - SCOPUS:24144445837
SN - 0780389387
VL - 3
T3 - IEEE International Conference on Communications
SP - 1518
EP - 1523
BT - IEEE International Conference on Communications, 2005
PB - IEEE
Y2 - 16 May 2005 through 20 May 2005
ER -