Protocols Using Anonymous Connections: Mobile Applications

نویسندگان

  • Michael G. Reed
  • Paul F. Syverson
  • David M. Goldschlag
چکیده

This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols take encryption as primitive. This abstraction allows us to focus on high level anonymity goals of these protocols much as abstracting away from encryption clari es and emphasizes high level security goals of key distribution protocols. The contributions of this paper are (1) a notation for describing such protocols, and (2) two protocols for location protected communication over a public infrastructure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Coordinated Anonymous Peer-to-Peer Connections with MoCha

MoCha is an exogenous coordination middleware for distributed communication based on mobile channels. Channels allow anonymous, and point-to-point communication among nodes, while mobility ensures that the structure of their connections can change over time in arbitrary ways. MoCha is implemented in the Java language using the Remote Method Invocation package (RMI) [15]. In this paper we promot...

متن کامل

A Reactive Protocol for Privacy Preservation using Location-Based Efficient Routing in MANETs

Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. However, existing anonymous routing protocols relying on either hop-by-hop encryption or redundant traffic, either incurs high cost or cannot provide full anonymity protection to data sources, destinations, and routes. The high ...

متن کامل

Learning Routing Paths in Anonymous Wireless Protocols CSCI8980 Machine Learning Course Project Report

With the rapid growth of the Internet as a means of communication concerns about security have also grown. As one of such security issues, anonymity shields the participants of network communications. Anonymous communication has become advantageous or essential for many applications such as E-Voting and military applications. Various anonymous systems have been designed for wireless networks, h...

متن کامل

Anonymous ID-based Group Key Agreement Protocol without Pairing

Secure group communication is an active area of research and its popularity is fuelled by the growing importance of group-oriented applications such as teleconferences, collaborative workspace, pay per-view etc. A number of group key agreement protocols have been proposed for these objectives. However most of the protocols have not considers the anonymity of the participants. Although in some a...

متن کامل

AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protoco...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997