Hidden Communication in P2P Networks Steganographic Handshake and Broadcast

被引:0
|
作者
Eidenbenz, Raphael [1 ]
Locher, Thomas [2 ]
Wattenhofer, Roger [1 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] IBM Res, Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the question of how a conspiring subgroup of peers in a p2p network can find each other and communicate without provoking suspicion among regular peers or an authority that monitors the network. In particular, we look at the problem of how a conspirer can broadcast a message secretly to all fellow conspirers. As a subproblem of independent interest, we study the problem of how a conspirer can safely determine a connected peer's type, i.e., learning whether the connected peer is a conspirer or a regular peer without giving away its own type in the latter case. For several levels of monitoring, we propose distributed and efficient algorithms that transmit hidden information by varying the block request sequence meaningfully. We find that a p2p protocol offers several steganographic channels through which hidden information can be transmitted, and p2p networks are susceptible to hidden communication even if they are completely monitored.
引用
收藏
页码:954 / 962
页数:9
相关论文
共 50 条
  • [41] r-Regular P2P Broadcast Networks: Optimal Delay and Throughput Using Network Coding
    Fu, Amy
    Sadeghi, Parastoo
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [42] Trustworthiness and CCCI metrics in P2P communication
    Hussain, FK
    Chang, E
    Dillon, T
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2004, 19 (03): : 173 - 190
  • [43] DINPeer: Optimized P2P communication network
    Guo, HQ
    Ngoh, LH
    Wong, WC
    Dong, LG
    [J]. INFORMATION NETWORKING: CONVERGENCE IN BROADBAND AND MOBILE NETWORKING, 2005, 3391 : 561 - 570
  • [44] A hierarchical P2P architecture for SIP communication
    Ma, Hongyan
    Xu, Baomin
    Wan, Huaxu
    Li, Chunyan
    [J]. NGMAST 2007: 2007 INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES, 2007, : 130 - +
  • [45] 2 P2P or not 2 P2P?
    Roussopoulos, M
    Baker, M
    Rosenthal, DSH
    Giuli, TJ
    Maniatis, P
    Mogul, J
    [J]. PEER-TO-PEER SYSTEMS III, 2004, 3279 : 33 - 43
  • [46] Hidden Markov model-based P2P flow identification: a hidden Markov model-based P2P flow identification method
    Xu, B.
    Chen, M.
    Wei, X.
    [J]. IET COMMUNICATIONS, 2012, 6 (13) : 2091 - 2098
  • [47] AALaaS Intelligent Backhauls for P2P Communication in 5G Mobile Networks
    Stainov, Rumen
    Goleva, Rossitza
    Mirtchev, Seferin
    Atamian, Dimitar
    Mirchev, Mircho
    Savov, Alexander
    Draganov, Plamen
    [J]. 2016 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2016,
  • [48] A Multi-layered Model for Scalable Group Communication in P2P Overlay Networks
    Tsuneizumi, Isamu
    Aikebaier, Ailixier
    Ikeda, Makoto
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011), 2011, : 324 - 331
  • [49] A JXTA-based Communication Model for OSGi Framework with Extension to P2P Networks
    Zhu, Chuan
    Chang, Guiran
    [J]. 2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 215 - 219
  • [50] Performance Analysis of P2P Networks with Light Communication Links: The Static Managed Case
    Hernandez-Oregon, Gerardo
    Rivero-Angeles, Mario E.
    Chimal-Eguia, Juan C.
    Coyac-Torres, Jorge E.
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (13):