Payload analysis of anonymous communication system with host-based rerouting mechanism
نویسندگان
چکیده
Host-based rerouting mechanism is a routing scheme that stores and forwards data in application layer. With this, users can communicate in a indirect way. Thus, identity information such as IP addresses can be effectively hidden against eavesdropper. In anonymous communication systems, such as Mixes, Onion Routing, and Crowds, this mechanism is adopted to provide anonymity. This mechanism, however, can result in extra overhead in performance such as communication delay and participant payload, which may affect the applications of anonymous communication systems. In this paper, we study quantitatively the participant payload induced by host-based rerouting mechanisms. A probability formula for calculating the participant payload is derived, which shows that the participant payload is determined by the number of participants, the number of rerouting paths, and the probability distribution of the length of rerouting paths. Applying this formula to the practical anonymous communication system, Crowds, we get immediately the precise expected participant payload, which significantly improves Reiter and Rubin’s original analysis and demonstrates that the participant payload in Crowds remains a constant and independent of the variation of the number of participants in Crowds. Simulation results are presented to testify our theoretical analysis.
منابع مشابه
SAS: A Scalar Anonymous Communication System
Anonymity technologies have gained more and more attention for communication privacy. In general, users obtain anonymity at a certain cost in an anonymous communication system, which uses rerouting to increase the system’s robustness. However, a long rerouting path incurs large overhead and decreases the quality of service (QoS). In this paper, we propose the Scalar Anonymity System (SAS) in or...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملPreventing Traffic Analysis for Real-Time Communication Networks
In this paper, we address issues related to preventing traffic analysis in computer networks used for realtime mission-critical applications. We consider an IP-based network where headers of packets, including source host address and destination host address, are readable by an observer (i.e., by a potential enemy). Although the encryption of network packets significantly increases privacy, the...
متن کاملPreventing Traffic Analysis for Real-Time Communication Networks - Military Communications Conference Proceedings, 1999. MILCOM 1999. IEEE
In this paper, we address issues related to preventing traffic analysis in computer networks used for realtime mission-critical applications. We consider an IP-based network where headers of packets, including source host address and destination host address, are readable by an observer (i.e., by a potential enemy). Although the encryption of network packets significantly increases privacy, the...
متن کاملDesign and Analysis of a Novel Tendon-less Backbone Robot
A new type of backbone robot is presented in this paper. The core idea is to use a cross shape mechanism with the principle of functioning of the scissors linkages, known as a pantograph. Although this continuum arm acts quite similar to tendon-driven robot, this manipulator does not include any tendon in its structure. This design does not suffer from the weaknesses of the continuum design suc...
متن کامل