Subversion Impedance in Covert Communication Networks Conference Paper uri icon

abstract

  • A covert communications network is a connected, overlay peer-to-peer network used to support communications within a group in which the survival of the group depends on: (1) anonymity of communications; and (2) concealment of network membership to both other members of the group and external eavesdroppers. These requirements are much more stringent than for typical privacy and anonymity systems. We consider the topologies of resilient covert communications networks that: (1) minimize the impact on the network in the event of a subverted node; and (2) maximize the connectivity of the survivor network with the removal of the subverted node and its closed neighborhood. We analyze the properties of resilient covert networks, propose a measurement for determining the suitability of a topology for use in a covert communication network, determine the properties of an optimal covert network topology, and analyze several optimal topologies. 2012 IEEE.

name of conference

  • 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications

published proceedings

  • 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications

altmetric score

  • 0.5

author list (cited authors)

  • Nix, T., & Bettati, R.

citation count

  • 2

complete list of authors

  • Nix, Timothy||Bettati, Riccardo

editor list (cited editors)

  • Min, G., Wu, Y., Liu, L. C., Jin, X., Jarvis, S. A., & Al-Dubai, A. Y.

publication date

  • June 2012