Anonymous Coherent Network Coding Against Active Adversary

ثبت نشده
چکیده

This paper considers a problem of anonymous transmission against eavesdropping and jamming in coherent network coding. A message of n packets is transmitted between some source-receiver pair. An adversary can eavesdrop arbitrary μ packets and inject no more then t malicious packets. The goal is to achieve a communication in such a manner that the adversary can not determine who communicates with whom. The scheme is based on coset coding for network coding and property of sum of uniform variables over a finite field. The scheme is simple but has requirement for network topology.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preventing Active Timing Attacks in Low-Latency Anonymous Communication

Low-latency anonymous communication protocols in general, and the popular onion-routing protocol in particular, are broken against simple timing attacks. While there have been few proposed solutions to this problem when the adversary is active, several padding schemes have been proposed to defend against a passive adversary that just observes timing patterns. Unfortunately active adversaries ca...

متن کامل

Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks

Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model the adversary can only see part of the links in the system. In a recent paper entitled Low-cost traffic analysis of Tor, it was shown that a variant of timing attack that does not require a global adversary can be appli...

متن کامل

Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack

Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traffic analysis by a passive adversary. However, it can be highly vulnerable to attacks by an active adversary. For instance, the adversary may perform a simple so–called repetitive attack: a malicious server sends the same massage...

متن کامل

Scalable Anonymous Group Communication in the Anytrust Model

Anonymous communication capabilities are useful and desirable, but practical onion routing approaches are vulnerable to traffic analysis and DoS attacks—especially against a powerful adversary, such as a repressive government or compromised ISP. To fill this gap we introduce D3, the first practical anonymous group communication system offering anonymity and disruption resistance against strong ...

متن کامل

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication

Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho Chakravarty The recent public disclosure of mass surveillance of electronic communication, involving powerful government authorities, has drawn the public’s attention to issues regarding Internet privacy. For almost a decade now, there have been several research efforts towards designing and deploying open so...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016