earticle

논문검색

Anonymity Leakage Reduction in Network Latency

초록

영어

Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users’' identity as to personal, source and destination location and content information. Notably, no network capability is in existence to completely negate anonymity leakage in network latency, thus, the minimization of anonymity leakage in network latency becomes critically salient. The purpose of this paper is to investigate network latency anonymity leaks, and propose practical techniques for their reduction. In this direction, we investigate the following technical question: what implementation techniques can be configured to truly reduce anonymity leaks using deployable systems. Here, an extension of the popular Tor security strategies and unique configuration of the popular network anonymity techniques (algorithms) for future implementation are presented.

목차

Abstract
 1. Introduction
 2. Anonymous communication schemes
  2.1 The multicast scenario
  2.2 The purpose of the paper.
  2.3 Typical time-based (latency) attack
  2.4 An active client-identification attack.
 3. A brief overview of the tor system
  3.1 Typical attack against the tor system:
  3.2 Limitations of existing studies
 4. Leakage reduction techniques
  4.1 The utility of onion routers in the tor system.
  4.2 The administrative ingenuity approach.
  4.3 Multicast technique to network anonymity.
  4.4 Two-pronged approach to attack detection.
 5. Conclusion
 References

저자정보

  • Longy O. Anyanwu, Ed.D. Mathematics and Computer Science, Fort Hays State University, Hays, Kansas, USA
  • Jared Keengwe, Ph.D. 2Jared Keengwe, Ph.D.. Department of Teaching and Learning, University of North Dakota, ND, USA
  • Gladys Arome, Ph.D. Department of Media and Instructional Tech., Florida Atlantic University, FL, USA

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.