With a Little Help from My Friends: Transport Deniability for Instant Messaging

02/04/2022
by   Boel Nelson, et al.
0

Traffic analysis for instant messaging (IM) applications continues to pose an important privacy challenge. In particular, transport-level data can leak unintentional information about IM – such as who communicates with whom. Existing tools for metadata privacy have adoption obstacles, including the risks of being scrutinized for having a particular app installed, and performance overheads incompatible with mobile devices. We posit that resilience to traffic analysis must be directly supported by major IM services themselves, and must be done in a low-cost manner without breaking existing features. As a first step in this direction, we propose a hybrid messaging model that combines regular and deniable messages. We present a novel protocol for deniable instant messaging, which we call DenIM. DenIM is built on the principle that deniable messages can be made indistinguishable from regular messages with a little help from a user's friends. Deniable messages' network traffic can then be explained by a plausible cover story. DenIM achieves overhead proportional to the messages sent, as opposed to scaling with time or number of users. To show the effectiveness of DenIM, we implement a trace simulator, and show that DenIM's deniability guarantees hold against strong adversaries such as internet service providers.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/23/2022

To Signal or Not to Signal? Layering Traffic Analysis Resistance on Secure Instant Messaging

Traffic analysis for instant messaging (IM) applications continues to po...
research
10/23/2019

Zephyr: Hiding Metadata in a Messaging System

Private messaging over internet related services is difficult to impleme...
research
08/22/2018

A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation

The number and variety of Internet-connected devices have grown enormous...
research
12/16/2022

A Survey on Anonymous Communication Systems with a Focus on Dining Cryptographers Networks

Traffic analysis attacks can counteract end-to-end encryption and use le...
research
12/11/2011

Maximum Production of Transmission Messages Rate for Service Discovery Protocols

Minimizing the number of dropped User Datagram Protocol (UDP) messages i...
research
07/30/2018

Experimental Analysis of Subscribers' Privacy Exposure by LTE Paging

Over the last years, considerable attention has been given to the privac...
research
07/08/2022

Strong Anonymity for Mesh Messaging

Messaging systems built on mesh networks consisting of smartphones commu...

Please sign up or login with your details

Forgot password? Click here to reset