Research Article | Open Access | Download PDF
Volume 3 | Issue 2 | Year 2012 | Article Id. IJCTT-V3I2P110 | DOI : https://doi.org/10.14445/22312803/IJCTT-V3I2P110
A Security Design combining the advantages of Cryptanalysis and Anonymous routing protocol to achieve data secrecy and anonymity
Varsha Waingankar, Swetha S
Citation :
Varsha Waingankar, Swetha S, "A Security Design combining the advantages of Cryptanalysis and Anonymous routing protocol to achieve data secrecy and anonymity," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 2, pp. 247-252, 2012. Crossref, https://doi.org/10.14445/22312803/IJCTT-V3I2P110
Abstract
Since internet is widely used these days , users privacy has become the main concern. Privacy is related to anonymity .Basic requirement for anonymity is to unlink the user’s identity to specific activities such as in a untraceable e-cash system and P2P payment systems. To provide anonymity various techniques are made use of such as identity based cryptography, blind messages, pseudonyms and ticket based protocol. But only the use of cryptography will not provide with the existence of confidential communication so anonymous routing protocol used along with cryptography helps to achieve better anonymity. With the use of anonymous routing protocol multiple packets cannot be linked to have originated from the same client . Hence the real network identity will be concealed making it difficult to find the client and the confidential relationship between the parties involved in communication.
Keywords
anonymity, privacy, routing protocol, onion routing, cryptography, and pseudonym.
References
[1] Jinyuan Sun, Member, IEEE, Chi Zhang, Student Member, IEEE, Yanchao Zhang, Member, IEEE, and Yuguang Fang, Fellow, IEEE “SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
[2] On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems . Matthew Edman ACM Journal Name, Vol. V, No. N, Month 2008, Pages 1{39.
[3] Attacks on Anonymity Systems: The Theory Roger Dingledine http://freehaven.net/
[4] R Dingledine, N Mathewson, and P Syverson. Tor: The Second Generation Onion Router. InProceedings of the 13th USENIX Security Symposium, pages 303–320, August 2004
[5] Michael G. Reed, Paul F. Syverson, David M. Goldschlag. “Proxies for anonymous Routing”. Naval Research Laboratory, Washington DC.
[6]TARo: Trusted Anonymous Routing for MANETs Jiefeng (Terence) Chen National ICT Australia Roksana Boreli ,National ICT Australia , Vijay Sivaraman School of Electrical Engineering and Telecommunications , University of New South Wales , Australia.