ANONYMOUS COMMUNICATIONS IN OVERLAY NETWORKS

被引:0
|
作者
Ren, Jian [1 ]
Li, Tongtong [1 ]
Li, Yun [1 ]
机构
[1] Michigan State Univ, Dept Elect & Comp Engn, E Landing, MI 48864 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Communication anonymity is becoming an increasingly important, or even indispensable security requirement for many applications. The existing research in anonymous communications can largely be divided into two categories: mix-based systems and secure multi-party computation-based systems, originating from mixnet and DC-net respectively. However, they either cannot provide provable anonymity, or suffer from transmission collision problem. In this paper, we first propose a novel unconditionally secure source anonymous message authentication code (SA-MAC) that can be applied to any messages without relying on any trusted third parties. While ensuring message sender anonymity, SM-MAC can also provide message content authenticity. We then propose a novel communication protocol that can hide the senders and the receivers from each other, and thus can be used for secure file sharing. The security analysis demonstrates that the proposed protocol is secure against various attacks. Our analysis also shows it is efficient and practical.
引用
收藏
页码:2061 / 2066
页数:6
相关论文
共 50 条
  • [1] Anonymous communication in overlay networks
    Ren, Jian
    Li, Yun
    Jiang, Tingting
    Li, Tongtong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (03) : 229 - 240
  • [2] Anonymous communication protocol in overlay networks
    Ren, Jian
    Li, Tongtong
    Han, Keesook
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1648 - +
  • [3] On collaborative anonymous communications in lossy networks
    Rebollo-Monedero, David
    Forne, Jordi
    Pallares, Esteve
    Parra-Arnau, Javier
    Tripp, Carolina
    Urquiza, Luis
    Aguilar, Monica
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2761 - 2777
  • [4] Survey on anonymous communications in computer networks
    Ren, Jian
    Wu, Jie
    [J]. COMPUTER COMMUNICATIONS, 2010, 33 (04) : 420 - 431
  • [5] ON THE FEASIBILITY OF A CDMA OVERLAY FOR PERSONAL COMMUNICATIONS NETWORKS
    MILSTEIN, LB
    SCHILLING, DL
    PICKHOLTZ, RL
    ERCEG, V
    KULLBACK, M
    KANTERAKIS, EG
    FISHMAN, DS
    BIEDERMAN, WH
    SALERNO, DC
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1992, 10 (04) : 655 - 668
  • [6] Anonymous Short Communications over Social Networks
    Buccafurri, Francesco
    De Angelis, Vincenzo
    Idone, Maria Francesca
    Labrini, Cecilia
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT II, 2021, 399 : 43 - 63
  • [7] Anonymous communications in mobile ad hoc networks
    Zhang, YC
    Liu, W
    Lou, WJ
    [J]. IEEE Infocom 2005: The Conference on Computer Communications, Vols 1-4, Proceedings, 2005, : 1940 - 1951
  • [8] Towards Efficient Anonymous Communications in Sensor Networks
    Chen, Juan
    Zhang, Hongli
    Fang, Binxing
    Du, Xiaojiang
    Yin, Lihua
    Yu, Xiangzhan
    [J]. 2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [9] AOS: an anonymous overlay system for mobile ad hoc networks
    Rui Zhang
    Yanchao Zhang
    Yuguang Fang
    [J]. Wireless Networks, 2011, 17 : 843 - 859
  • [10] AOS: an anonymous overlay system for mobile ad hoc networks
    Zhang, Rui
    Zhang, Yanchao
    Fang, Yuguang
    [J]. WIRELESS NETWORKS, 2011, 17 (04) : 843 - 859