Anonymous Communication over Invisible Mix Rings

نویسندگان

  • Ming Zheng
  • Hai-Xin Duan
  • Jianping Wu
چکیده

Protect the identity of participants may be advantageous or essential and even critical for many internet applications. Mix rings architecture give better performance than mix-nets while maintaining anonymity that is stronger than onion routing. This paper presents an enhancement of mix rings, which is a hybrid P2P system and is designed to provide anonymity under a strong adversarial model in terms of identification, anonymity and resilience to collusion, along with low latency of data delivery and the link utilization. We use a double-layer overlay network, composed of nodes that are interested in anonymity and trusted index nodes and introduce several cluster escape and random extend mechanisms into mix rings. We present a description of the protocol, an analysis of common attack defense, and evaluate the degree of anonymity using MATLAB simulations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Klein Bottle Routing: An Alternative to Onion Routing and Mix Network

Traditionally, there are two methods to implement anonymous channels: free-route networks like onion routing and cascade networks like mix network. Each of them has its merits and is suitable for some certain applications of anonymous communication. Both of them have their own drawbacks, so neither of them can satisfy some applications. A third solution to anonymous channels, Klein bottle routi...

متن کامل

A Survey on Tor and I2P

This paper gives a short introduction and a comparison on two low-latency anonymous communication networks. The main part features a review of the low latency anonymous communication networks, namely, The Onion Routing (Tor) and the Invisible Internet Project (I2P). An introduction to their overall structure is given, followed by a detailed description of the core parts of both networks. Furthe...

متن کامل

Anonymous Communication in Multi Hop Wireless Networks

In this paper we present a protocol for unlinkable and anonymous communication in multi hop wireless networks. There exist solutions for unlinkable communication in the internet, such as Tor and Mix networks. These protocols need fixed infrastructure and they are prone to traffic analysis attacks, i.e. where an attacker tries to map communicating devices by performing statistical analysis. Wire...

متن کامل

Sleeping dogs lie on a bed of onions but wake when mixed

We introduce and investigate sleeper attacks and explore them in the context of anonymous communication, especially mix networks. Sleeper attacks can make use of the interference inherent to mix protocols. Simply by leaving his own messages in a mix network an adversary can learn about the communication of network users. Sleeper attacks can be combined with epistemic attacks, statistical disclo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011