Ideas for Realizing Secure Low-latency Anonymity Network using Network Coding
抄録
With the advent of Internet of Things (IoT), billions of devices are not only connected to each other but constantly exchanged information. This has brought about the development of various applications that support it and are current discussion in the research community. However, security of devices and privacy are still an open issue. In this paper, we propose a new anonymous network to ensure the privacy of users or devices in a communication. First, we surveyed various works on anonymity network, then provide a brief overview of our proposed anonymous network. Specifically, our method adopts a distributed hash table (DHT) and network coding to achieve a peer-to-peer (P2P) network anonymity and secure user’s identity in a communication. Each source node creates a packet with two layers, onion-like structure, the first layer is encrypted with the destination node public key while the second and outer layer is encrypted with the exit node public key. Our proposed method will guarantee the secure communication and ensure anonymity of the two parties at the end of the communication.
With the advent of Internet of Things (IoT), billions of devices are not only connected to each other but constantly exchanged information. This has brought about the development of various applications that support it and are current discussion in the research community. However, security of devices and privacy are still an open issue. In this paper, we propose a new anonymous network to ensure the privacy of users or devices in a communication. First, we surveyed various works on anonymity network, then provide a brief overview of our proposed anonymous network. Specifically, our method adopts a distributed hash table (DHT) and network coding to achieve a peer-to-peer (P2P) network anonymity and secure user’s identity in a communication. Each source node creates a packet with two layers, onion-like structure, the first layer is encrypted with the destination node public key while the second and outer layer is encrypted with the exit node public key. Our proposed method will guarantee the secure communication and ensure anonymity of the two parties at the end of the communication.
収録刊行物
-
- 第25回マルチメディア通信と分散処理ワークショップ論文集
-
第25回マルチメディア通信と分散処理ワークショップ論文集 2017 203-207, 2017-10-04
- Tweet
詳細情報 詳細情報について
-
- CRID
- 1050855522066178560
-
- NII論文ID
- 170000176034
-
- Web Site
- http://id.nii.ac.jp/1001/00183659/
-
- 本文言語コード
- en
-
- 資料種別
- conference paper
-
- データソース種別
-
- IRDB
- CiNii Articles