SGor: Trust graph based onion routing
نویسندگان
چکیده
1389-1286/$ see front matter 2013 Elsevier B.V. All rights reserved. http://dx.doi.org/10.1016/j.comnet.2013.08.005 ⇑ Corresponding author. Tel.: +852 62134272. E-mail addresses: [email protected] (P. Zhou), csxluo@ comp.polyu.edu.hk (X. Luo), [email protected] (A. Chen), csrchang@ comp.polyu.edu.hk (R.K.C. Chang). 1 This work was done when the co-author was with The Hong Kong Polytechnic University. Peng Zhou a,⇑, Xiapu Luo , Ang Chen , Rocky K.C. Chang a
منابع مشابه
Inference attacks against trust-based onion routing: Trust degree to the rescue
Trust-based onion routing enhances anonymity protection by means of constructing onion circuits using trust-based routers. However, attackers who have the knowledge of a priori trust distributions are still capable of largely reducing the anonymity protected by trustbased circuits. The root cause is that these attackers have a high probability to guess the users who initiate trust-based circuit...
متن کاملMore Anonymity through Trust Degree in Trust-Based Onion Routing
Trust-based onion routing employs users’ own trust to circumvent compromised onion routers. However, it runs a high risk of being deanonymized by the inference attacks based on a priori trust relationships. In this paper, we first observe that the onion routers with higher trust degrees (e.g., those that are trusted by more other users) are more effective in defending against the inference atta...
متن کاملTowards More Trustworthy Trust- Based Systems for Anonymity and Web Security
In today’s Internet, trust has been widely used to design anonymity and security enhanced systems. Some of these trust-based systems have been successfully deployed in the Internet for a long time and benefit a large population of Internet users. In particular, trust-based onion routing network is a representative example for the use of trust in protecting anonymity. As one of the most popular ...
متن کاملHiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
Internet censorship and surveillance have made anonymity tools increasingly critical for free and open Internet access. Tor, and its associated ecosystem of volunteer traffic relays, provides one of the most secure and widely-available means for achieving Internet anonymity today. Unfortunately, Tor has limitations, including poor performance, inadequate capacity, and a susceptibility to wholes...
متن کاملEnhanced Onion Routing Framework for MANETs
The mobile ad hoc networks (MANETs) is wireless and dynamic topology network medium, which may suffer from many open security criticism. The major issue of mobile ad hoc networks (MANETs) is to send the data in secure manner from source to destination node in adversarial (opponent) environment such wireless node communication issues are node traffic, node attack and data accessing of intermedia...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 57 شماره
صفحات -
تاریخ انتشار 2013