Abstract

The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

Highlights

  • The rapid development of network technology has made anonymous communication an increasingly important security requirement for many network applications [1]

  • Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis

  • We propose an efficient onion routing protocol named anonymous identity-based onion routing (AIB-OR) that provides provable security and strong anonymity

Read more

Summary

Introduction

The rapid development of network technology has made anonymous communication an increasingly important security requirement for many network applications [1]. Of data, or by examining coincidences, such as connections opening and closing at about the same time. In many situations, it is highly desirable or indispensable for users to be able to preserve the communications anonymity. An abrupt change in the traffic pattern may indicate some forthcoming activities in a tactical military communication network. This can be extremely dangerous in that adversaries can identify critical network nodes and launch targeted attacks on them. People have a strong desire to remain anonymous when pursuing sensitive information in order to avoid unnecessary trouble. Onion routing has been widely employed as an infrastructure for private communication over a public network

Related Work
Motivation and Our Contributions
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call