Peer-to-Peer Anonymous Networking Using Coding

被引:0
|
作者
Chang, Christopher S. [1 ,2 ]
Ho, Tracey [2 ]
Effros, Michelle [2 ]
机构
[1] Samsung Elect Co Ltd, Seoul, South Korea
[2] CALTECH, Dept Elect Engn, Pasadena, CA 91125 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider design and analysis of coding-based anonymous routing systems in peer-to-peer (P2P) overlay networks. An unknown subset of participating nodes is adversarial, and can collude to try to identify the communicating nodes through passive observations. The first part of this work considers subgraph setup in the absence of a reliable public key infrastructure (PKI). As in the "slicing the onion" scheme proposed by Katti et al., a sender constructs a layered subgraph over which coding is performed, but we propose a new coding scheme with a formal information theoretic security characterization. We consider optimization of protocol parameters to maximize the adversary's uncertainty, as measured by the entropy of the source and sink identities, and show that a randomized strategy can improve anonymity and resource usage efficiency. The second part of this work focuses on the data transmission phase, assuming availability of a subgraph setup scheme (either PKI-based or coding-based) and end-to-end encryption. We use network coding at intermediate nodes to improve networking performance and reduce complexity by replacing expensive cryptographic operations at each hop with simpler linear algebra operations.
引用
收藏
页码:525 / 532
页数:8
相关论文
共 50 条
  • [11] ShadowWalker: Peer-to-peer Anonymous Communication Using Redundant Structured Topologies
    Mittal, Prateek
    Borisov, Nikita
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 161 - 172
  • [12] Accounting firm cashes in with peer-to-peer networking
    Clark, Elizabeth
    Network Magazine, 2002, 17 (05): : 68 - 73
  • [13] Secure peer-to-peer networking: the JXTA example
    Americas, Sun Microsystems' iPlanet Professional Services Group
    IT Professional, 2002, 4 (02) : 53 - 57
  • [14] Face-to-face with peer-to-peer networking
    Clark, D
    COMPUTER, 2001, 34 (01) : 18 - 21
  • [15] Protocol for peer-to-peer networking in mobile environments
    Schollmeier, R
    Gruber, I
    Niethammer, F
    ICCCN 2003: 12TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2003, : 121 - 127
  • [16] Disruptive networking with peer-to-peer systems - Introduction
    Khan, Javed I.
    Wierzbicki, Adam
    COMPUTER COMMUNICATIONS, 2008, 31 (03) : 419 - 422
  • [17] Scalable peer-to-peer networking architecture: DIVINE
    Wong, William Hak-Lim
    Ng, Joseph Kee-Yin
    SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (13): : 1467 - 1487
  • [18] Efficient Peer-to-Peer Content Distribution Using Network Coding
    Wang, Xiaoli
    Zhao, Qun
    Zhang, Yongsheng
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [19] A universal anonymous system for structured peer-to-peer networks
    Lee, Li-Yuan
    Lee, Jiunn-Jye
    Lei, Chin-Laung
    TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 896 - 899
  • [20] Survey of anonymous peer-to-peer file-sharing
    Chothia, T
    Chatzikokolakis, K
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 744 - 755