Abstract
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.
Highlights
The rapid development of network technology has made anonymous communication an increasingly important security requirement for many network applications [1]
Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis
We propose an efficient onion routing protocol named anonymous identity-based onion routing (AIB-OR) that provides provable security and strong anonymity
Summary
The rapid development of network technology has made anonymous communication an increasingly important security requirement for many network applications [1]. Of data, or by examining coincidences, such as connections opening and closing at about the same time. In many situations, it is highly desirable or indispensable for users to be able to preserve the communications anonymity. An abrupt change in the traffic pattern may indicate some forthcoming activities in a tactical military communication network. This can be extremely dangerous in that adversaries can identify critical network nodes and launch targeted attacks on them. People have a strong desire to remain anonymous when pursuing sensitive information in order to avoid unnecessary trouble. Onion routing has been widely employed as an infrastructure for private communication over a public network
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have