Abstract

One of the methods to maintain the anonymity of communicating nodes in a network is the mix technique. Mix networks have been subject to various traffic analysis attacks that aim at compromising the identities of these communication nodes. Our focus in this paper is to propose mix network schemes that are more robust against these attacks. To this end, we propose using traffic re-distribution techniques. Traffic re-distribution involves changing the number and size of messages in the network by splitting and merging the messages at network nodes and using variable size messages to confuse the attacker. The security and anonymity of the proposed techniques are evaluated against traffic analysis attacks. Performance analysis is provided to determine the effectiveness of the proposed techniques.

Original languageEnglish (US)
Pages (from-to)244-264
Number of pages21
JournalJournal of Network and Systems Management
Volume18
Issue number3
DOIs
StatePublished - Sep 1 2010

Keywords

  • Anonymity
  • Onion routing
  • Security
  • Watermark attack

ASJC Scopus subject areas

  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications
  • Strategy and Management

Fingerprint Dive into the research topics of 'Low-latency mix using split and merge operations'. Together they form a unique fingerprint.

  • Cite this