Skip to main content

A Random Walk Based Anonymous Peer-to-Peer Protocol Design

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3619))

Abstract

Anonymity has been one of the most challenging issues in Ad Hoc environment such as P2P systems. In this paper, we propose an anonymous protocol called Random Walk based Anonymous Protocol (RWAP), in decentralized P2P systems. We evaluate RWAP by comprehensive trace driven simulations. Results show that RWAP significantly reduces traffic cost and encryption overhead compared with existing approaches.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anonymity, http://freehaven.net/anonbib/topic.html

  2. FIPS-197: Advanced Encryption Standard, National Institute of Standards and Technology (NIST), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  3. Gnutella, http://gnutella.wego.com/

  4. Gnutella Protocol Development, http://rfc-gnutella.sourceforge.net/index.html

  5. The Gnutella Protocol Spedification v0.4, http://www.clip2.com/GnutellaProtocol04.pdf

  6. KaZaA, http://www.kazaa.com

  7. Napster, http://www.napster.com

  8. Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web Caching and Zipf-like Distributions: Evidence and Implications. In: Proceedings of IEEE INFOCOM (1999)

    Google Scholar 

  9. Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: Making Gnutella-like P2P Systems Scalable. In: Proceedings of ACM SIGCOMM (2003)

    Google Scholar 

  10. Cohen, E., Shenker, S.: Replication Strategies in Unstructured Peer-to-peer Networks. In: Proceedings of ACM SIGCOMM (2002)

    Google Scholar 

  11. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (2004)

    Google Scholar 

  12. Gkantsidis, C., Mihail, M., Saberi, A.: Random Walks in Peer-to-Peer Networks. In: Proceedings of IEEE INFOCOM (2004)

    Google Scholar 

  13. Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, SOSP (2003)

    Google Scholar 

  14. Jia, W., Xuan, D., Tu, W., Lin, L., Zhao, W.: Distributed Admission Control for Anycast Flows. IEEE Transactions on Parallel and Distributed Systems, TPDS (2004)

    Google Scholar 

  15. Law, C., Siu, K.-Y.: Distributed Construction of Random Expander Networks. In: Proceedings of IEEE INFOCOM (2003)

    Google Scholar 

  16. Liu, Y., Liu, X., Xiao, L., Ni, L.M., Zhang, X.: Location-Aware Topology Matching in Unstructured P2P Systems. In: Proceedings of IEEE INFOCOM (2004)

    Google Scholar 

  17. Lv, Q., Cao, P., Edith, C., Li, K., Shenker, S.: Search and Replication in Unstructured Peer-to-Peer Networks. In: Proceedings of International Conference on Supercomputing (ICS 2002). ACM, New York (2002)

    Google Scholar 

  18. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security (1998)

    Google Scholar 

  19. Rennhard, Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. In: Proceedings of ACM workshop on Privacy in the Electronic Society (2002)

    Google Scholar 

  20. Scarlata, V., Levine, B.N., Shields, C.: Responder Anonymity and Anonymous Peer-to-Peer File Sharing. In: Proceedings of the 9th International Conference of Network Protocol, ICNP (2001)

    Google Scholar 

  21. Shields, C., Levine, B.N.: A Protocol for Anonymous Communication over the Internet. In: Proceedings of 7th ACM Conference on Computer and Communication Security, ACM CCS (2000)

    Google Scholar 

  22. Xiao, L., Xu, Z., Zhang, X.: Low-cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Han, J., Liu, Y., Lu, L., Hu, L., Patil, A. (2005). A Random Walk Based Anonymous Peer-to-Peer Protocol Design. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_17

Download citation

  • DOI: https://doi.org/10.1007/11534310_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28102-3

  • Online ISBN: 978-3-540-31868-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics