Skip to main content

Communications in Unknown Networks: Preserving the Secret of Topology

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3499))

Abstract

Cryptography investigates security aspects of data distributed in a network. This kind of security does not protect the secrecy of the network topology against being discovered if some kind of communication has to be established. But there are several scenarios where even the network topology has to be a part of the secret.

In this paper we study the question of communication within a secret network where all processing nodes of the network have only partial knowledge (e.g. given as routing tables) of the complete topology. We introduce a model for measuring the loss of security of the topology when far distance communication takes place. We will investigate lower bounds on the knowledge that can be deduced from the communication string. Several kinds of routing tables are not sufficient to guarantee the secrecy of topology. On the other hand, if a routing table allows to specify the direction from which a message is coming from we can run a protocol solving the all–to–all communication problem such that no processing node can gain additional knowledge about the network.

Finally, we investigate the problem, whether a knowledge base can be generated from local knowledge of the processing nodes without losing the state of secrecy. It will be shown that this is not possible for static networks and most kinds of dynamic networks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop WiSe 2002, pp. 21–30 (2002)

    Google Scholar 

  2. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness Theorem for Non cryptographic Fault-tolerant Distributed Computing. In: STOC 1988, pp. 1–10 (1988)

    Google Scholar 

  3. Bläser, M., Jakoby, A., Liśkiewicz, M., Siebert, B.: Private Computation – k-connected versus 1-connected Networks. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 194–209. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Burmester, M., Desmedt, Y.: Secure Communication in an Unknown Network Using Certificates. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 274–287. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  5. Burmester, M., Van Le, T.: Secure Multipath Communication in Mobile Ad hoc Networks. In: ITCC 2004, pp. 405–409 (2004)

    Google Scholar 

  6. Burmester, M., Van Le, T., Yasinsac, A.: Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. In: Nikolaidis, I., Barbeau, M., Kranakis, E. (eds.) ADHOC-NOW 2004. LNCS, vol. 3158, pp. 96–107. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACS 4(2), 84–88 (1981)

    Article  Google Scholar 

  8. Chaum, D., Crépau, C., Damgård, I.: Multiparty unconditionally secure protocols. In: STOC 1988, pp. 11–19 (1988)

    Google Scholar 

  9. Dolev, D.: The Byzantine generals strike again. J. of Algorithms 3(1), 14–30 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  10. Franklin, M., Wright, N.: Secure communication in minimal connectivity models. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 346–360. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  11. Franklin, M., Yung, M.: Secure hypergraphs: privacy from partial broadcast (Extended Abstract). In: STOC 1995, pp. 36–44 (1995)

    Google Scholar 

  12. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Information Hiding 1996, pp. 137–150 (1996)

    Google Scholar 

  13. Hinkelmann, M.: Preserving the Secret of Topology, Diplomarbeit, Institut für Theoretische Informatik, Universität zu Lübeck (2004)

    Google Scholar 

  14. Jakoby, A., Liśkiewicz, M., Reischuk, R.: Private Computations in Networks: Topology versus Randomness. In: Alt, H., Habib, M. (eds.) STACS 2003. LNCS, vol. 2607, pp. 121–132. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Reiter, M., Rubin, A.: Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)

    Article  Google Scholar 

  16. Shannon, C.E.: A Mathematical Theory of Communication. The Bell System Technical Journal 27, 379–423, 623–656 (1948)

    MATH  MathSciNet  Google Scholar 

  17. Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous Connections and Onion Routing. In: IEEE Symposium on Security and Privacy, pp. 4–7 (1997)

    Google Scholar 

  18. Wang, Y., Desmedt, Y.: Secure communication in broadcast channels: the answer to Franklin and Wright’s question. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 446–458. Springer, Heidelberg (1999)

    Google Scholar 

  19. Yao, A.C.: Protocols for Secure Computations. In: FOCS 1982, pp. 160–164 (1982)

    Google Scholar 

  20. Yao, A.C.: How to generate and exchange secrets. In: FOCS 1986, pp. 162–167 (1986)

    Google Scholar 

  21. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hinkelmann, M., Jakoby, A. (2005). Communications in Unknown Networks: Preserving the Secret of Topology. In: Pelc, A., Raynal, M. (eds) Structural Information and Communication Complexity. SIROCCO 2005. Lecture Notes in Computer Science, vol 3499. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11429647_14

Download citation

  • DOI: https://doi.org/10.1007/11429647_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26052-3

  • Online ISBN: 978-3-540-32073-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics