Abstract

One of the methods to maintain the anonymity of communicating nodes in a network is the mix technique. Mix networks have been subject to various traffic analysis attacks that aim at compromising the identities of these communication nodes. Our focus in this paper is to propose mix network schemes that are more robust against these attacks. To this end, we propose using traffic re-distribution techniques. Traffic re-distribution involves changing the number and size of messages in the network by splitting and merging the messages at network nodes and using variable size messages to confuse the attacker. The security and anonymity of the proposed techniques are evaluated against traffic analysis attacks. Performance analysis is provided to determine the effectiveness of the proposed techniques.

Original languageEnglish (US)
Pages (from-to)244-264
Number of pages21
JournalJournal of Network and Systems Management
Volume18
Issue number3
DOIs
StatePublished - Sep 2010

Fingerprint

Merging
Communication
Latency
Attack
Node
Anonymity
Redistribution

Keywords

  • Anonymity
  • Onion routing
  • Security
  • Watermark attack

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Strategy and Management

Cite this

Low-latency mix using split and merge operations. / Huang, Dijiang; Kandiah, Vinayak.

In: Journal of Network and Systems Management, Vol. 18, No. 3, 09.2010, p. 244-264.

Research output: Contribution to journalArticle

@article{b9f16f045bee43f18c036b2e91be36a5,
title = "Low-latency mix using split and merge operations",
abstract = "One of the methods to maintain the anonymity of communicating nodes in a network is the mix technique. Mix networks have been subject to various traffic analysis attacks that aim at compromising the identities of these communication nodes. Our focus in this paper is to propose mix network schemes that are more robust against these attacks. To this end, we propose using traffic re-distribution techniques. Traffic re-distribution involves changing the number and size of messages in the network by splitting and merging the messages at network nodes and using variable size messages to confuse the attacker. The security and anonymity of the proposed techniques are evaluated against traffic analysis attacks. Performance analysis is provided to determine the effectiveness of the proposed techniques.",
keywords = "Anonymity, Onion routing, Security, Watermark attack",
author = "Dijiang Huang and Vinayak Kandiah",
year = "2010",
month = "9",
doi = "10.1007/s10922-010-9170-0",
language = "English (US)",
volume = "18",
pages = "244--264",
journal = "Journal of Network and Systems Management",
issn = "1064-7570",
publisher = "Springer New York",
number = "3",

}

TY - JOUR

T1 - Low-latency mix using split and merge operations

AU - Huang, Dijiang

AU - Kandiah, Vinayak

PY - 2010/9

Y1 - 2010/9

N2 - One of the methods to maintain the anonymity of communicating nodes in a network is the mix technique. Mix networks have been subject to various traffic analysis attacks that aim at compromising the identities of these communication nodes. Our focus in this paper is to propose mix network schemes that are more robust against these attacks. To this end, we propose using traffic re-distribution techniques. Traffic re-distribution involves changing the number and size of messages in the network by splitting and merging the messages at network nodes and using variable size messages to confuse the attacker. The security and anonymity of the proposed techniques are evaluated against traffic analysis attacks. Performance analysis is provided to determine the effectiveness of the proposed techniques.

AB - One of the methods to maintain the anonymity of communicating nodes in a network is the mix technique. Mix networks have been subject to various traffic analysis attacks that aim at compromising the identities of these communication nodes. Our focus in this paper is to propose mix network schemes that are more robust against these attacks. To this end, we propose using traffic re-distribution techniques. Traffic re-distribution involves changing the number and size of messages in the network by splitting and merging the messages at network nodes and using variable size messages to confuse the attacker. The security and anonymity of the proposed techniques are evaluated against traffic analysis attacks. Performance analysis is provided to determine the effectiveness of the proposed techniques.

KW - Anonymity

KW - Onion routing

KW - Security

KW - Watermark attack

UR - http://www.scopus.com/inward/record.url?scp=77954958167&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77954958167&partnerID=8YFLogxK

U2 - 10.1007/s10922-010-9170-0

DO - 10.1007/s10922-010-9170-0

M3 - Article

AN - SCOPUS:77954958167

VL - 18

SP - 244

EP - 264

JO - Journal of Network and Systems Management

JF - Journal of Network and Systems Management

SN - 1064-7570

IS - 3

ER -