Skip to main content

Anonymous Communication over Invisible Mix Rings

  • Conference paper
Algorithms and Architectures for Parallel Processing (ICA3PP 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7016))

Abstract

Protect the identity of participants may be advantageous or essential and even critical for many internet applications. Mix rings architecture give better performance than mix-nets while maintaining anonymity that is stronger than onion routing. This paper presents an enhancement of mix rings, which is a hybrid P2P system and is designed to provide anonymity under a strong adversarial model in terms of identification, anonymity and resilience to collusion, along with low latency of data delivery and the link utilization. We use a double-layer overlay network, composed of nodes that are interested in anonymity and trusted index nodes and introduce several cluster escape and random extend mechanisms into mix rings. We present a description of the protocol, an analysis of common attack defense, and evaluate the degree of anonymity using MATLAB simulations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Reiter, M.K., Rubin, A.D.: Anonymous Web transactions with crowds. Commun. Acm 42, 32–38 (1999)

    Article  Google Scholar 

  2. Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Sel. Area Comm. 16, 482–494 (1998)

    Article  Google Scholar 

  3. Jia, Z., Haixin, D., Wu, L., Jianping, W.: A light-weighted extension of anonymous communications in IPv6 Network. In: International Conference Green Circuits and Systems (ICGCS), pp. 404–408 (2010)

    Google Scholar 

  4. Burnside, M., Keromytis, A.D.: Low latency anonymity with mix rings. Information Security. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 32–45. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Chaum, D.L.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Commun. Acm 24, 84–88 (1981)

    Article  Google Scholar 

  6. Freedman, M.J., Sit, E., Cates, J., Morris, R.: Introducing Tarzan, a peer-to-peer anonymizing network layer. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 121–129. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptol, 1, 65–75 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  8. Dolev, S., Ostrobsky, R.: Xor-trees for efficient anonymous multicast and reception. ACM Transactions on Information and System Security (TISSEC) 3, 63–84 (2000)

    Article  Google Scholar 

  9. Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: A Protocol for Scalable Anonymous Communication. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, p. 58. IEEE Computer Society, Los Alamitos (2002)

    Chapter  Google Scholar 

  10. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th conference on USENIX Security Symposium, vol. 13, p. 21. USENIX Association, San Diego (2004)

    Google Scholar 

  11. Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 116–131. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Berthold, O., Federrath, H., Köhntopp, M.: Project "anonymity and unobservability in the Internet. In: Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions, pp. 57–65. ACM, Toronto (2000)

    Chapter  Google Scholar 

  13. Han, J., Liu, Y.: Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems. In: Proceedings of the 2006 IEEE International Conference on Network Protocols, pp. 22–31. IEEE Computer Society, Los Alamitos (2006)

    Chapter  Google Scholar 

  14. Levine, B., Reiter, M., Wang, C., Wright, M.: Timing Attacks in Low-Latency Mix Systems. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 251–265. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  15. Wright, M.K., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Transactions on Information and System Security (TISSEC) 7, 489–522 (2004)

    Article  Google Scholar 

  16. Back, A., Möller, U., Stiglic, A.: Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245–257. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  17. Shields, C., Levine, B.N.: A protocol for anonymous communication over the Internet. In: Proceedings of the 7th ACM conference on Computer and communications security, pp. 33–42. ACM, Athens (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zheng, M., Duan, H., Wu, J. (2011). Anonymous Communication over Invisible Mix Rings. In: Xiang, Y., Cuzzocrea, A., Hobbs, M., Zhou, W. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2011. Lecture Notes in Computer Science, vol 7016. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24650-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24650-0_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24649-4

  • Online ISBN: 978-3-642-24650-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics