Payload analysis of anonymous communication system with host-based rerouting mechanism

نویسندگان

  • Hongfei Sui
  • Jianer Chen
  • Songqiao Chen
  • Jianxin Wang
چکیده

Host-based rerouting mechanism is a routing scheme that stores and forwards data in application layer. With this, users can communicate in a indirect way. Thus, identity information such as IP addresses can be effectively hidden against eavesdropper. In anonymous communication systems, such as Mixes, Onion Routing, and Crowds, this mechanism is adopted to provide anonymity. This mechanism, however, can result in extra overhead in performance such as communication delay and participant payload, which may affect the applications of anonymous communication systems. In this paper, we study quantitatively the participant payload induced by host-based rerouting mechanisms. A probability formula for calculating the participant payload is derived, which shows that the participant payload is determined by the number of participants, the number of rerouting paths, and the probability distribution of the length of rerouting paths. Applying this formula to the practical anonymous communication system, Crowds, we get immediately the precise expected participant payload, which significantly improves Reiter and Rubin’s original analysis and demonstrates that the participant payload in Crowds remains a constant and independent of the variation of the number of participants in Crowds. Simulation results are presented to testify our theoretical analysis.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SAS: A Scalar Anonymous Communication System

Anonymity technologies have gained more and more attention for communication privacy. In general, users obtain anonymity at a certain cost in an anonymous communication system, which uses rerouting to increase the system’s robustness. However, a long rerouting path incurs large overhead and decreases the quality of service (QoS). In this paper, we propose the Scalar Anonymity System (SAS) in or...

متن کامل

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

Preventing Traffic Analysis for Real-Time Communication Networks

In this paper, we address issues related to preventing traffic analysis in computer networks used for realtime mission-critical applications. We consider an IP-based network where headers of packets, including source host address and destination host address, are readable by an observer (i.e., by a potential enemy). Although the encryption of network packets significantly increases privacy, the...

متن کامل

Preventing Traffic Analysis for Real-Time Communication Networks - Military Communications Conference Proceedings, 1999. MILCOM 1999. IEEE

In this paper, we address issues related to preventing traffic analysis in computer networks used for realtime mission-critical applications. We consider an IP-based network where headers of packets, including source host address and destination host address, are readable by an observer (i.e., by a potential enemy). Although the encryption of network packets significantly increases privacy, the...

متن کامل

Design and Analysis of a Novel Tendon-less Backbone Robot

A new type of backbone robot is presented in this paper. The core idea is to use a cross shape mechanism with the principle of functioning of the scissors linkages, known as a pantograph. Although this continuum arm acts quite similar to tendon-driven robot, this manipulator does not include any tendon in its structure. This design does not suffer from the weaknesses of the continuum design suc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003