Skip to main content

Improving TCP Performance in Mix Networks

  • Conference paper
Progress in Systems Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 366))

  • 3107 Accesses

Abstract

The rapid usage of wireless technology and the rise of user privacy concerns, mix networks have been identified as a technology that could ensure users anonymity and protect user privacy. Many noticeable efforts have been presented signifying different approaches to balance between Anonymity and the quality of service (QoS) in mix networks, but all of these efforts have limitations that made them impractical solutions. In this paper, we analytically discuss TCP performance issues in flow-based mix networks and address how batching and reordering of packets in mix network can radically reduce TCP throughput, because of out-of-order packet delivery. We present a solution to improve the performance of the TCP by using an adaptive TCP’s duplicate threshold dupthresh. Our proposed approach will not degrade the system anonymity degree since they do not change the underlying anonymity mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Paul, S et. al: Architectures for the future networks and the next generation Internet: A survey. Computer Communications, (2010), 34(1), 2-42

    Article  Google Scholar 

  2. Seshan, S. : Collaborative Research NeTS-FIND: Protecting User. (2010), available at: www.nets-find.net/Funded/pdf_files/Protecting.pdf

  3. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications, (1981), 4(2), 84-90.

    Google Scholar 

  4. Dingledine, R. et al.: Tor: The second-generation onion router. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13 (2004).

    Google Scholar 

  5. Parekh, S: Prospects for Remailers-Where Is Anonymity Heading, (1996). available at: http://freehaven.net/anonbib/cache/remailer-history.html.

    Google Scholar 

  6. Lier, M., Cottrell, L.: Mixmaster Protocol-Version, (2000). Available at: http://www.eskimo.com/~rowdenw/crypt/Mix/draft-moeller-mixmaster2-protocol-00.txt

    Google Scholar 

  7. Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. Selected Areas in Communications, IEEE Journal on, (1998) 16(4), 482,494.

    Google Scholar 

  8. Ming Zhang; Karp, B.; Floyd, Sally; Peterson, L.: RR-TCP: a reordering-robust TCP with DSACK. Proceedings of the 11th IEEE International Conference on Network Protocols, (2003), 95–106.

    Google Scholar 

  9. Xinwen, Fu, et al.: TCP Performance in Flow-Based Mix Networks: Modeling and Analysis. IEEE Transactions On Parallel And Distributed Systems, 20(5), (2009).

    Google Scholar 

  10. Katz, R.: The Eifel Algorithm: Making TCP Robust against Spurious Retransmission. ACM Computer Comm. Rev, 30(1), 30-36, (2000).

    Article  Google Scholar 

  11. Bohacek, S.; Hespanha, J.P.; Junsoo Lee; Chansook Lim; Obraczka, K.,: TCP-PR: TCP for persistent packet reordering. Proceedings of the 23rd International Conference on Distributed Computing Systems (2003) 222-231.

    Google Scholar 

  12. Zhang, F., Zhang, Y.: Improving TCP Performance over Mobile Ad-Hoc Networks with Out-of-Order Detection and Respo. Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, (2002) 217 - 225.

    Google Scholar 

  13. Han, H: Performance improvement of TCP_Reno based on monitoring the wireless packet loss rate. Proceedings of the 3rd IEEE International Conference on Communication Software and Networks (ICCSN), (2011) 469-472.

    Google Scholar 

  14. D. Chaum, B: Untraceable electronic mail, return addresses, and digital pseudonyms, Commun. ACM (1981), 24(2), 84–88,

    Article  Google Scholar 

  15. G. Danezis, R. Dingledine, and N. Mathewson: Mixminion: Design of a Type III Anonymous Remailer Protocol. Proc. IEEE Symp. Security and Privacy (S&P ’03), (2003).

    Google Scholar 

  16. M. Wright, M. Adler, B.N. Levine, and C. Shields: An Analysis of the Degradation of Anonymous Protocols. Proc. Network and Distributed Security Symp. (NDSS ’02), (2002).

    Google Scholar 

  17. M. Wright, M. Adler, B.N. Levine, and C. Shields, “Defending Anonymous Communication against Passive Logging Attacks,” Proc. IEEE Symp. Security and Privacy (S&P ’03), May 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed K. Watfa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Watfa, M.K., Diab, M., Stephen, N. (2015). Improving TCP Performance in Mix Networks. In: Selvaraj, H., Zydek, D., Chmaj, G. (eds) Progress in Systems Engineering. Advances in Intelligent Systems and Computing, vol 366. Springer, Cham. https://doi.org/10.1007/978-3-319-08422-0_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08422-0_62

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08421-3

  • Online ISBN: 978-3-319-08422-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics