anonymous routing
Recently Published Documents


TOTAL DOCUMENTS

103
(FIVE YEARS 12)

H-INDEX

12
(FIVE YEARS 2)

Author(s):  
Aleksandar Tošic ◽  
Jernej Vičič

To anonymous internet traffic, many popular protocols route traffic through a network of nodes in order to conceal information about the request. However, routing traffic through other nodes inherently introduces added latency. Over the past two decades, there were many attempts to improve the path selection in order to decrease latency with little or no trade-off in terms of security, and anonymity. In this paper, we show the potential use of geo-sharding in decentralized routing networks to improve fault-tolerance, and latency. Such networks can be used as a communication layer for Edge devices computing huge amounts of data. Specifically, we focus our work on Low Latency Anonymous Routing Protocol (LLARP), a protocol built on top of Oxen blockchain that aims to achieve internet privacy. We analyse the existing network of Service Nodes(SN), observe cloud provider centralisation, and propose a high level protocol that provides incentives for a better geographical distribution mitigating potential cloud provider/country wide service dropouts. Additionally, the protocol level information about geographical location can be used to improve client’s path (the string of nodes that will participate in the transaction) selection, decreasing network latency. We show the feasibility of our approach by comparing it with the random path selection in a simulated environment. We observe marginal drops in average latency when selecting paths geographically closer to each other.


2021 ◽  
Author(s):  
Amin Sarihi ◽  
Ahmad Patooghy ◽  
Mahdi Hasanzadeh ◽  
Mostafa Abdelrehim ◽  
Abdel-Hameed A. Badawy
Keyword(s):  

Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6683
Author(s):  
Fengyin Li ◽  
Ying Wang ◽  
Hongwei Ju ◽  
Yanli Wang ◽  
Zhaojie Wang ◽  
...  

Anonymous technology is an effective way for protecting users’ privacy. Anonymity in sensor networks is to prevent the unauthorized third party from revealing the identities of the communication parties. While, in unstable wireless sensor networks, frequent topology changes often lead to route-failure in anonymous communication. To deal with the problems of anonymous route-failure in unstable sensor networks, in this paper we propose a fully anonymous routing protocol with self-healing capability in unstable sensor networks by constructing a new key agreement scheme and proposing an anonymous identity scheme. The proposed protocol maintains full anonymity of sensor nodes with the self-healing capability of anonymous routes. The results from the performance analysis show that the proposed self-healing anonymity-focused protocol achieves full anonymity of source nodes, destination nodes, and communication association.


2020 ◽  
Vol 2020 (3) ◽  
pp. 304-326
Author(s):  
Alexander Bajic ◽  
Georg T. Becker

AbstractThe Internet infrastructure has not been built with security or privacy in mind. As a result, an adversary who has control over a single Autonomous System can set-up mass surveillance systems to gather meta data by passively collecting the headers of the messages they route. To solve this problem, lightweight anonymous routing protocols such as LAP, DOVETAIL and most recently PHI have been proposed which are efficient enough to be deployed in a large scale infrastructure such as the Internet. In this paper we take a closer look at PHI and introduce several de-anonymization attacks malicious nodes can perform to reduce the sender and receiver anonymity. As a direct consequence of this analysis we propose a new protocol called dependable PHI (dPHI). The security analysis of dPHI includes a detailed quantitative anonymity analysis that compares dPHI with PHI, LAP and HORNET. Together with the performance analysis, this allows for a good comparison of trade-offs for these anonymity protocols.


2019 ◽  
Vol 18 (12) ◽  
pp. 2926-2940 ◽  
Author(s):  
Kazuya Sakai ◽  
Min-Te Sun ◽  
Wei-Shinn Ku ◽  
Jie Wu

2019 ◽  
Vol 8 (4) ◽  
pp. 9667-9674

For express employments of the mobile ad hoc networks (MANETs) sent during opponent conditions, unidentified correspondences through data overwhelm with expectedness is goliath. A fundamental thing is to give unidentifiability and unlinkability toward the mobile center obsessions as well as their techniques. The present protocol be weak against security dangers similar to if all else fails government administrator strikes, fake routing packs ambushes otherwise denial-of-service (DoS) broad-tossing assault, transfer examination strikes as well as insider strikes. During this document we suggest another routing protocol which is an improvement of the present protocol Authenticated Anonymous Secure Routing (AASR) protocol. AASR secures the strikes and outfits adequate nonattendance of clearness with the help of get-together signature and key mixed onion routing. In this work a bound together trust the board plan has been hardened with AASR protocol in order to upgrade the routing and data security in MANETs. Beguilement consequences contain shown the adequacy of the planned protocol through enhanced execution to the degree throughput, bunch got degree, pack adversity degree and surrender when ascended out of the present ones.


Sign in / Sign up

Export Citation Format

Share Document