2016 13th IEEE Annual Consumer Communications &Amp; Networking Conference (CCNC) 2016
DOI: 10.1109/ccnc.2016.7444937
|View full text |Cite
|
Sign up to set email alerts
|

A first-hop traffic analysis attack against a femtocell

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…The aim of attackers in this approach is to obtain the credentials of the communicating parties. The attackers focuses on analysis of the traffic with the aim of decoding the secret keys of interacting entities [13]. The hybrid encryption secured the credentials of communicating parties as follows.…”
Section: I) Credential Securitymentioning
confidence: 99%
“…The aim of attackers in this approach is to obtain the credentials of the communicating parties. The attackers focuses on analysis of the traffic with the aim of decoding the secret keys of interacting entities [13]. The hybrid encryption secured the credentials of communicating parties as follows.…”
Section: I) Credential Securitymentioning
confidence: 99%
“…can reveal significant information about a traffic flow, see e.g. [16], [4], [6], [7] and references therein. A number of defences have been proposed to counter these traffic analysis attacks, mostly addressing attacks that make use of packet size, count and the length of transmission e.g.…”
Section: Related Workmentioning
confidence: 99%
“…they modify the traffic by padding the packets to be the same length or by adding dummy traffic to the end of the packet sequence to mask the packet count [8]. These defences are, however, ineffective against attacks that solely use timing information of network flows, see for example [6] and [7]. To the best of our knowledge none of this previous work on defences against traffic analysis attacks has considered fairness or the joint aspect of the trade-off between privacy, throughput and delay in a shared network.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation