Documento de conferencia

An efficient methodology to limit path length guaranteeing anonymity in overlay networks

Conference Proceeding cp
SECRYPT 2008 - International Conference on Security and Cryptography, Proceedings
  • Fecha: 01 diciembre 2008
  • Páginas: 205-208
  • ISBN: 9789898111593
  • Tipo de fuente: Ponencia
  • Tipo de documento: Documento de conferencia
An alternative to guarantee anonymity in overlay networks may be achieved by building a multi-hop path between the origin and the destination. However, one hop in the overlay network can consist of multiple Internet Protocol (IP) hops. Therefore, the length of the overlay multi-hop path must be reduced in order to maintain a good balance between the cost and the benefit provided by the anonymity facility. Unfortunately, the simple Time-To-Live (TTL) algorithm cannot be directly applied here since its use could reveal valuable information to break anonymity. In this paper, a new mechanism which reduces the length of the overlay multi-hop paths is presented. The anonymity level is evaluated by means of simulation and good results are reported.

Palabras clave del autor

    Palabras clave indexadas

      Detalles de financiación