Ideas for Realizing Secure Low-latency Anonymity Network using Network Coding

抄録

With the advent of Internet of Things (IoT), billions of devices are not only connected to each other but constantly exchanged information. This has brought about the development of various applications that support it and are current discussion in the research community. However, security of devices and privacy are still an open issue. In this paper, we propose a new anonymous network to ensure the privacy of users or devices in a communication. First, we surveyed various works on anonymity network, then provide a brief overview of our proposed anonymous network. Specifically, our method adopts a distributed hash table (DHT) and network coding to achieve a peer-to-peer (P2P) network anonymity and secure user’s identity in a communication. Each source node creates a packet with two layers, onion-like structure, the first layer is encrypted with the destination node public key while the second and outer layer is encrypted with the exit node public key. Our proposed method will guarantee the secure communication and ensure anonymity of the two parties at the end of the communication.

With the advent of Internet of Things (IoT), billions of devices are not only connected to each other but constantly exchanged information. This has brought about the development of various applications that support it and are current discussion in the research community. However, security of devices and privacy are still an open issue. In this paper, we propose a new anonymous network to ensure the privacy of users or devices in a communication. First, we surveyed various works on anonymity network, then provide a brief overview of our proposed anonymous network. Specifically, our method adopts a distributed hash table (DHT) and network coding to achieve a peer-to-peer (P2P) network anonymity and secure user’s identity in a communication. Each source node creates a packet with two layers, onion-like structure, the first layer is encrypted with the destination node public key while the second and outer layer is encrypted with the exit node public key. Our proposed method will guarantee the secure communication and ensure anonymity of the two parties at the end of the communication.

収録刊行物

詳細情報 詳細情報について

  • CRID
    1050855522066178560
  • NII論文ID
    170000176034
  • Web Site
    http://id.nii.ac.jp/1001/00183659/
  • 本文言語コード
    en
  • 資料種別
    conference paper
  • データソース種別
    • IRDB
    • CiNii Articles

問題の指摘

ページトップへ