• DocumentCode
    1629929
  • Title

    Peer-to-peer anonymous networking using coding

  • Author

    Chang, C.S. ; Ho, Tracey ; Effros, Michelle

  • Author_Institution
    Dept. of Electr. Eng., California Inst. of Technol., Pasadena, CA, USA
  • fYear
    2012
  • Firstpage
    525
  • Lastpage
    532
  • Abstract
    In this paper, we consider design and analysis of coding-based anonymous routing systems in peer-to-peer (P2P) overlay networks. An unknown subset of participating nodes is adversarial, and can collude to try to identify the communicating nodes through passive observations. The first part of this work considers subgraph setup in the absence of a reliable public key infrastructure (PKI). As in the “slicing the onion” scheme proposed by Katti et al., a sender constructs a layered subgraph over which coding is performed, but we propose a new coding scheme with a formal information theoretic security characterization. We consider optimization of protocol parameters to maximize the adversary´s uncertainty, as measured by the entropy of the source and sink identities, and show that a randomized strategy can improve anonymity and resource usage efficiency. The second part of this work focuses on the data transmission phase, assuming availability of a subgraph setup scheme (either PKI-based or coding-based) and end-to-end encryption. We use network coding at intermediate nodes to improve networking performance and reduce complexity by replacing expensive cryptographic operations at each hop with simpler linear algebra operations.
  • Keywords
    computer network security; cryptographic protocols; graph theory; network coding; overlay networks; peer-to-peer computing; public key cryptography; routing protocols; P2P overlay networks; adversary uncertainty; coding-based anonymous routing system analysis; cryptographic operations; data transmission phase; end-to-end encryption; entropy; formal information theoretic security characterization; intermediate nodes; layered subgraph setup scheme; linear algebra; network coding; peer-to-peer anonymous networking; protocol parameter optimization; randomized strategy; reliable public key infrastructure; sink identity; slicing the onion scheme; source identity; Cryptography; Encoding; Entropy; Peer-to-peer computing; Routing; Vectors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on
  • Conference_Location
    Monticello, IL
  • Print_ISBN
    978-1-4673-4537-8
  • Type

    conf

  • DOI
    10.1109/Allerton.2012.6483263
  • Filename
    6483263