A random walk based anonymous peer-to-peer protocol design

被引:0
|
作者
Han, JS
Liu, YH
Lu, L
Hu, L
Patil, A
机构
[1] Hong Kong Univ Sci & Technol, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Beijing, Peoples R China
[3] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48823 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymity has been one of the most challenging issues in Ad Hoc environment such as P2P systems. In this paper, we propose an anonymous protocol called Random Walk based Anonymous Protocol (RWAP), in decentralized P2P systems. We evaluate RWAP by comprehensive trace driven simulations. Results show that RWAP significantly reduces traffic cost and encryption overhead compared with existing approaches.
引用
收藏
页码:143 / 152
页数:10
相关论文
共 50 条
  • [41] Formal verification of a peer-to-peer streaming protocol
    Ojo, Oluwafolake E.
    Oluwatope, Ayodeji O.
    Ajadi, Suraju O.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2020, 32 (06) : 730 - 740
  • [42] HUP: An Unstructured Hierarchical Peer-to-Peer Protocol
    Khataniar, Guruprasad
    Goswami, Diganta
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 671 - 676
  • [43] A Scalable Peer-to-Peer Group Communication Protocol
    Tsuneizumi, Isamu
    Aikebaier, Ailixier
    Enokido, Tomoya
    Takizawa, Makoto
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 268 - 275
  • [44] Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments
    Chow, Chi-Yin
    Mokbel, Mohamed F.
    Liu, Xuan
    GEOINFORMATICA, 2011, 15 (02) : 351 - 380
  • [45] Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments
    Chi-Yin Chow
    Mohamed F. Mokbel
    Xuan Liu
    GeoInformatica, 2011, 15 : 351 - 380
  • [46] A new peer-to-peer micropayment protocol based on transferable debt token
    Yen S.-M.
    Chiou K.-Z.
    Zhang J.
    Lee P.-H.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 6340 (PART 1): : 352 - 363
  • [47] A Hybrid Protocol Architecture for Peer-to-Peer Control Based on SIP and UPnP
    Thomas, Kevin
    Gruver, William A.
    Sabaz, Dorian
    Ng, Colin
    2009 IEEE INTERNATIONAL SYSTEMS CONFERENCE, PROCEEDINGS, 2009, : 262 - +
  • [48] A challenge-based trust establishment protocol for peer-to-peer networks
    Chen, Pei-Te
    Laih, Chi-Sung
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 71 - 78
  • [49] A quorum-based protocol for searching objects in peer-to-peer networks
    Miura, K
    Tagawa, T
    Kakugawa, H
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2006, 17 (01) : 25 - 37
  • [50] An Advanced Hyper-Efficient Design to Detect Random Peer-to-Peer Botnets
    Siddiqui, Isma Farah
    Faseeh, Nawab Muhammad
    Lee, Scott U. K-Jin
    Unar, Mukhtiar Ali
    COMMUNICATION TECHNOLOGIES, INFORMATION SECURITY AND SUSTAINABLE DEVELOPMENT, 2014, 414 : 251 - 258