Self-adaptive Topology-hiding Broadcast based on CRT

被引:0
|
作者
Mi Bo [1 ]
Wei Tiancheng [1 ]
Huang Darong [1 ]
Li Yang [1 ]
机构
[1] Chongqing Jiaotong Univ, Coll Informat Sci & Engn, Chongqing 400074, Peoples R China
关键词
CRT; Topology-Hiding Protection; ideal;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the course of network communication, the exposure of network topology may seriously result in leaking sensitive information to attackers, saying social relationships or financial flows. Howbeit, balancing the functionality of routing between topology concealment is never a trivial task in consideration of efficiency, robustness, and scalability. Though a certain of topological-hiding protocols have emerged in recent years, they are faulty with third-party dependence and high latency. This paper focuses on devising a broadcast protocol exploiting the structure of ideal. We also implemented it utilizing the Chinese Remainder Theorem (CRT) and compared it with previous schemes. It is proved that our protocol is unconditionally secure under the game-based definition of topology hiding and capable of broadcasting the information with few iterations. Besides, the simulation also demonstrates its preferable computation/communication overhead in contrast with existing protocols, not to mention that any third-party would be unnecessary.
引用
收藏
页码:1043 / 1047
页数:5
相关论文
共 50 条
  • [31] Using the ring neighborhood topology with self-adaptive differential evolution
    Omran, Mahamed G. H.
    Engelbrecht, Andries P.
    Salman, Ayed
    ADVANCES IN NATURAL COMPUTATION, PT 1, 2006, 4221 : 976 - 979
  • [32] T-TOHIP: Trust-based topology-hiding multipath routing in mobile ad hoc network
    Rahul K. Ambekar
    Uttam D. Kolekar
    Evolutionary Intelligence, 2022, 15 : 1067 - 1081
  • [33] Modified Topology-Hiding Multipath Routing (M-THMR) Protocol: Solution to the Topology Exposure Problem in MANET
    Phalke, Akshay Suhas
    Lagad, Jyoti Umesh
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2017, : 50 - 55
  • [34] T-TOHIP: Trust-based topology-hiding multipath routing in mobile ad hoc network
    Ambekar, Rahul K.
    Kolekar, Uttam D.
    EVOLUTIONARY INTELLIGENCE, 2022, 15 (02) : 1067 - 1081
  • [35] Pixel-Value-Ordering based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy
    Lu, Tzu-Chuen
    Tseng, Chun-Ya
    Huang, Shu-Wen
    Thanh Nhan Vo
    SYMMETRY-BASEL, 2018, 10 (12):
  • [36] AFL-TOHIP: Adaptive Fractional lion optimization to topology-hiding multi-path routing in mobile ad hoc network
    Ambekar, Rahul K.
    Kolekar, Uttam D.
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 727 - 732
  • [37] Topology control research of monitor network based on pid of self-adaptive hierarchical genetic algorithm
    Ruan, Dian-Xu
    Zhang, Xiao-Guang
    Information Technology Journal, 2013, 12 (12) : 2374 - 2381
  • [38] A self-adaptive gradient-based particle swarm optimization algorithm with dynamic population topology ?
    Zhang, Daren
    Ma, Gang
    Deng, Zhuoran
    Wang, Qiao
    Zhang, Guike
    Zhou, Wei
    APPLIED SOFT COMPUTING, 2022, 130
  • [39] Research on Self-adaptive Algorithm in Self-adaptive Web System
    Cao, CaiFeng
    Luo, YaoZu
    Gong, Jing
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 25 - 28
  • [40] Design and Performance Study of a Topology-Hiding Multipath Routing Protocol for Mobile Ad Hoc Networks
    Zhang, Yujun
    Wang, Guiling
    Hu, Qi
    Li, Zhongcheng
    Tian, Jie
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 10 - 18