DocumentCode :
568483
Title :
Network Coding-Based Mutual Anonymity Communication Protocol for Mobile P2P Networks
Author :
Li, Zhi-yuan ; Wang, Liang-min ; Chen, Si-guang
Author_Institution :
Dept. of Comput. Sci., Jiangsu Univ., Zhenjiang, China
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
986
Lastpage :
991
Abstract :
To protect user privacy in mobile peer to peer (MP2P) networks, a network coding-based mutual anonymity communication protocol (NMA) is proposed. Our contributions are described as below. We first design a network coding scheme which can defend against various omniscient adversary attacks. Then a novel anonymous communication protocol is presented to meet the anonymity requirement for MP2P applications. The novel anonymous communication protocol is comprised of three steps: query issuance, reply-confirm and file delivery. They all employ the network coding scheme to split and encrypt the signaling and data information. The splitted fragments are flooded at a certain number of hops until some intermediate peers called agents, can collect enough fragments to recover the original information. Next, the agents forward the messages to their neighboring peers. For the query issuance, the neighboring peers forward the query message to the responders by random walk mechanism. For the rest steps, the data information is delivered along the reversed paths discovered by the way of onion routing plus buffer information in routing table. In the entire process, the identities and sensitive information about the initiator and responder are completely hidden. The advantages of the scheme lie in the fact that the network coding and mutli-agent can improve the load balance, the successful rate of information transmission and anonymity degree. The experimental results demonstrate that when the percentage of malicious peers is lower than 50%, the various performances of the NMA, including the response time and the success rate, outperform other mutual anonymity schemes.
Keywords :
cryptographic protocols; data privacy; mobile computing; multi-agent systems; network coding; peer-to-peer computing; resource allocation; MP2P applications; NMA; anonymity degree; anonymity requirement; anonymous communication protocol; data information; file delivery; information transmission; initiator; intermediate peers; load balance; malicious peers; mobile peer to peer networks; multi-agent; neighboring peers; network coding-based mutual anonymity communication protocol; onion routing; query issuance; query message; random walk mechanism; reply-confirm; responder; response time; reversed paths; routing table; signaling encryption; success rate; user privacy protection; Cryptography; Encoding; Mobile computing; Network coding; Peer to peer computing; Protocols; Time factors; linear network coding; mobile peer to peer networks; mutual anonymity; onion routing; user privacy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
Type :
conf
DOI :
10.1109/TrustCom.2012.211
Filename :
6296080
Link To Document :
بازگشت