The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Anonymous network provides user privacy to protect identity. The onion routing (TOR) project is one kind of Internet anonymous networks which attracts many researchers and clients nowadays, because of its simplicity and scalability. However, there are some difficulties to analyze TOR performance within live TOR networks since it is distributed and its security nature. This paper presents a TOR network...
Internet eXchange Points (IXPs) serve as landmarks where many network service providers meet to obtain reciprocal connectivity. Some of them, especially the largest, offer route servers as a convenient technology to simplify the setup of a high number of bi-lateral peerings. Due to their potential to support a quick and easy interconnection among the networks of multiple providers, IXPs are becoming...
Content-Centric Networking (CCN) is an emerging paradigm that can anticipate growing demands of content delivery in coming years. The underlying architecture of the CCN enables users to search for content based on names. On one hand, this is a privacy-friendly feature that do not require source and destination addresses. On the other hand, semantically-rich names reveal sufficient information about...
The Internet is the main source of communication now-a-days; however, the identities of senders and receivers are not hidden. If someone wants to hide his/her identity, the most suitable choice is to use anonymous communication. Anonymous communication not only provides anonymity but also privacy. Anonymity is not something which was invented with the Internet. To overcome this and provide anonymity,...
Content Delivery Networks (CDN) act as trusted overlay networks that offer high-performance delivery of common Web objects, static data and rich multimedia content by distributing content load among edge servers which are close to the clients. And the interconnection of different CDNs (called CDNi) could provide more advantages and benefits to both content provider and client than a single CDN during...
Tor is an open network that helps to defend against traffic analysis and thus achieves anonymity and resisting censorship online. Nowadays many researches have been carried out to attack Tor and to break the anonymity. To deanonymize the Tor, the attacker must be able to control both the guard node and exit node of a circuit. In this paper, we present an analysis on end-to-end node selection probability...
Online social networks (OSN) have now become one of the most widely used Internet applications with a huge base of online users. In an OSN, the users exchange their personal information via messages, pictures and videos with their online peers/friends for their personal or business interests. Since the information that flows across an OSN is generally of personal in nature, it is important that the...
Popularity and awareness of anonymisation systems increased tremendously over the past years, however only a very few systems made it from research to production. These systems usually add intermediate nodes in the communication path aiming to hide user identities. Several attacks against these systems exist, like timing attacks or exploitation of latency information. In this paper, we propose an...
In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but operated by potentially untrusted adversaries, we consider several proposals for protecting the identities of the queried sensors. Our schemes do not rely on the use of public key cryptography nor do they make any assumptions...
This paper is concerned with decentralized planning and scheduling where the information for decision making resides within local agents. When considering a decentralized approach, the goal is not primarily on achieving global optimality. For instance, [Greenstadt et al. 2006] studies the tradeoff in the Distributed Constraint Optimization (DCOP) problem on efficiency, privacy and optimality. In principle,...
The performance of peer-to-peer anonymous communication system relies on all members participating together in the system, but the free-riding behavior caused by the inactive behaviors will decline the performance of the anonymous communication system. In order to decline to the selfish behavior, an anonymous communication strategy based on the idea of different service is proposed with respect to...
Today, most P2P applications do not consider locality on the underlying network topology when choosing their neighbors on the P2P routing layer. As a result, participating peers may experience long delays and peers' ISPs suffer from a large amount of (costly) inter-ISP traffic. One potential solution to mitigate these problems is to have ISPs or third parties convey information regarding the underlying...
We address issues related to privacy protection in location-based services (LBS). Most existing research in this field either requires a trusted third-party (anonymizer) or uses oblivious protocols that are computationally and communicationally expensive. Our design of privacy-preserving techniques is principled on not requiring a trusted third-party while being highly efficient in terms of time and...
The advances in wireless communication and mobile computing make new types of applications possible. In this context, userspsila navigation becomes one of the most popular applications. The existing approaches to compute a route are either server- or client-based. The first one computes the route on a server and sends back the result to the mobile device. The second one computes it directly on the...
We first provide an overview of the better known network approaches for assuring anonymity and privacy over networks. Then analyze possible attacks on network, discuss the key approaches and their implementation design issues for network privacy. In the conclusion we discuss the results, indicating research opportunities in this domain.
Wireless Mesh Networks (WMN), this term was coined few years back in network research community. Due to its profound applicability, highly reliable connectivity, easy deployment, flexible interoperability with other networks drew much attention even within this short time. Although, lot of work is going on in this field but still issues like privacy and trust are left unattended. This paper address...
Research shows that location based routing can improve the performance and efficiency of communication in mobile ad hoc networks. From another point of view, disclosure of location information can cause a serious privacy risk, especially in environments where different groups of nodes cannot fully trust each other. In this paper, we propose a protocol through which a wireless node can achieve configurable...
Privacy of message during transactions between grid nodes belonging to public realm has become a mounting apprehension for nodes engaged in the communication. While it is imperative to ensure a high level of security for geographically dispersed distributed nodes, privacy issues for concealing individual profiles and identities are worth concerning. Privacy in the user profile management is prime...
Source IP spoofing attacks are critical issues to the Internet. These attacks are considered to be sent from bot infected hosts. There has been active research on IP traceback technologies. However, the traceback from an end victim host to an end spoofing host has not yet been achieved, due to the lack of traceback probes installed on each routing path. There is a need to replace alternative probes...
Anonymity in telecommunication services means much more than protecting the identity of participants. It requires mechanisms and protocols that unlink the communication parties, unlink users from their location, and avoid statistical analysis. These functional requirements apply also when providing anonymity services to SIP, whereas the identities of caller and the callee(s) should be secured. On...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.