Anonymous Coherent Network Coding Against Active Adversary
ثبت نشده
چکیده
This paper considers a problem of anonymous transmission against eavesdropping and jamming in coherent network coding. A message of n packets is transmitted between some source-receiver pair. An adversary can eavesdrop arbitrary μ packets and inject no more then t malicious packets. The goal is to achieve a communication in such a manner that the adversary can not determine who communicates with whom. The scheme is based on coset coding for network coding and property of sum of uniform variables over a finite field. The scheme is simple but has requirement for network topology.
منابع مشابه
Preventing Active Timing Attacks in Low-Latency Anonymous Communication
Low-latency anonymous communication protocols in general, and the popular onion-routing protocol in particular, are broken against simple timing attacks. While there have been few proposed solutions to this problem when the adversary is active, several padding schemes have been proposed to defend against a passive adversary that just observes timing patterns. Unfortunately active adversaries ca...
متن کاملDesign Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model the adversary can only see part of the links in the system. In a recent paper entitled Low-cost traffic analysis of Tor, it was shown that a variant of timing attack that does not require a global adversary can be appli...
متن کاملOnions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traffic analysis by a passive adversary. However, it can be highly vulnerable to attacks by an active adversary. For instance, the adversary may perform a simple so–called repetitive attack: a malicious server sends the same massage...
متن کاملScalable Anonymous Group Communication in the Anytrust Model
Anonymous communication capabilities are useful and desirable, but practical onion routing approaches are vulnerable to traffic analysis and DoS attacks—especially against a powerful adversary, such as a repressive government or compromised ISP. To fill this gap we introduce D3, the first practical anonymous group communication system offering anonymity and disruption resistance against strong ...
متن کاملTraffic Analysis Attacks and Defenses in Low Latency Anonymous Communication
Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication Sambuddho Chakravarty The recent public disclosure of mass surveillance of electronic communication, involving powerful government authorities, has drawn the public’s attention to issues regarding Internet privacy. For almost a decade now, there have been several research efforts towards designing and deploying open so...
متن کامل