Peer-to-Peer Anonymous Networking Using Coding

被引:0
|
作者
Chang, Christopher S. [1 ,2 ]
Ho, Tracey [2 ]
Effros, Michelle [2 ]
机构
[1] Samsung Elect Co Ltd, Seoul, South Korea
[2] CALTECH, Dept Elect Engn, Pasadena, CA 91125 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider design and analysis of coding-based anonymous routing systems in peer-to-peer (P2P) overlay networks. An unknown subset of participating nodes is adversarial, and can collude to try to identify the communicating nodes through passive observations. The first part of this work considers subgraph setup in the absence of a reliable public key infrastructure (PKI). As in the "slicing the onion" scheme proposed by Katti et al., a sender constructs a layered subgraph over which coding is performed, but we propose a new coding scheme with a formal information theoretic security characterization. We consider optimization of protocol parameters to maximize the adversary's uncertainty, as measured by the entropy of the source and sink identities, and show that a randomized strategy can improve anonymity and resource usage efficiency. The second part of this work focuses on the data transmission phase, assuming availability of a subgraph setup scheme (either PKI-based or coding-based) and end-to-end encryption. We use network coding at intermediate nodes to improve networking performance and reduce complexity by replacing expensive cryptographic operations at each hop with simpler linear algebra operations.
引用
收藏
页码:525 / 532
页数:8
相关论文
共 50 条
  • [1] Peer-to-peer networking
    Joyce, John
    Scientific Computing and Instrumentation, 2001, 18 (08):
  • [2] THE VALUE OF PEER-TO-PEER NETWORKING
    MEAD, T
    DATAMATION, 1990, 36 (09): : 10 - 10
  • [3] Peer-to-peer networking and perspective
    Varone, S.
    Rytz, C.
    ComTec, 2001, 79 (04):
  • [4] A definition of Peer-to-Peer networking for the classification of Peer-to-Peer architectures and applications
    Schollmeier, R
    FIRST INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, 2002, : 101 - 102
  • [5] PPAA: peer-to-peer anonymous authentication
    Tsang, Patrick P.
    Smith, Sean W.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 55 - 74
  • [6] Incentivizing anonymous "peer-to-peer" reviews
    Venkitasubramaniam, Parv
    Sahai, Anant
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 692 - +
  • [7] A PERSPECTIVE ON ADVANCED PEER-TO-PEER NETWORKING
    GREEN, PE
    CHAPPUIS, RJ
    FISHER, JD
    FROSCH, PS
    WOOD, CE
    IBM SYSTEMS JOURNAL, 1987, 26 (04) : 414 - 428
  • [8] Enabling mobile peer-to-peer networking
    Oberender, JO
    Andersen, FU
    de Meer, H
    Dedinski, I
    Hossfeld, T
    Kappler, C
    Mäder, A
    Tutschku, K
    WIRELESS SYSTEMS AND MOBILITY IN NEXT GENERATION INTERNET, 2005, 3427 : 219 - 234
  • [9] Coordinated anonymous peer-to-peer connections with MoCha
    Guillen-Scholten, J
    Arbab, F
    SCIENTIFIC ENGINEERING OF DISTRIBUTED JAVA APPLICATIONS, 2005, 3409 : 68 - 77
  • [10] WonGoo: A peer-to-peer protocol for anonymous communication
    Lu, TB
    Fang, BX
    Sun, YZ
    Cheng, XQ
    PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 1102 - 1106