Source Anonymity using multiple mixes in Packet Scheduling

Main Article Content

Mrs.S.Suganyadevi
Mrs.Dr.V.Anuratha

Abstract

-Secret communication, where users converse without revealing the personalities of communicating parties or the trails of data stream is critical in data networks. On the Internet, Chaum mixes, intermediate nodes, or proxy servers, which use coated encryption and packet shuffling techniques to hide source identities, are used to provide anonymity to network users. In this analysis, an information theoretic structure is developed to study the maximum anonymity possible by packet shuffling when the merges are memory restricted—in other words, they can store a finite number of packets. Network of mixes over receiving packet sources from an eavesdropper’s perspective as the measure of secrecy, the maximum achievable secrecy of a single mix with buffer size b (packets which contains the source and destination details of itself ) serving for achieving multiple mixes (network of mixes). By obtaining network of mixes the source anonymity is achieved successfully. For a general multiuser system, the maximum anonymity as buffer size b→∞ is shown to approach the entropy of the source arrival probabilities at a convergence rate no less significant than 1/b2 . When the arrival probabilities of the general multiuser system can be expressed as a rational portion k/2 n for some fixed n, this union rate is shown to be achievable. The secrecy analysis is extended to a common network of mixes linking the sources to multi destination, where the source secrecy achievable on the target link is shown to be lower enclosed by a weighted sum of the secrecy achievable by each individual mix

Article Details

How to Cite
[1]
Mrs.S.Suganyadevi and Mrs.Dr.V.Anuratha, “Source Anonymity using multiple mixes in Packet Scheduling”, Int. J. Comput. Eng. Res. Trends, vol. 3, no. 6, pp. 332–335, Jun. 2016.
Section
Research Articles

References

Abhishek Mishra ; ECE Department, Lehigh University, ; Parv Venkitasubramaniam “Anonymity and Fairness in Packet Scheduling: A Quantitative Tradeoff” DOI: 10.1109/CISS.2012.6310742

N. West, The SIGINT Secrets: The Signals Intelligence War, 1900 to Today. New York, NY, USA: William Marrow, 1988.

U. S. Navy, “Military study, communication intelligence research activities,” Dept. Navy Library, Washington Navy Yard, Washington, DC, USA, Tech. Rep. SRH-151, Jun. 1937.

A. Back, U. Möller, and A. Stiglic, “Traffic analysis attacks and tradeoffs in anonymity providing systems,” in Proc. 4th Int. Inf. Hiding Workshop, Pittsburg, PA, USA, Apr. 2001, pp. 245–257.

J.-F. Raymond, “Traffic analysis: Protocols, attacks, design issues, and open problems,” in Proc. Int. Workshop Designing Privacy Enhancing Technol., Design Issues Anonymity Unobservability, LNCS vol. 2009. 2001, pp. 10–29.

D. L. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Commun. ACM, vol. 24, no. 2, pp. 84–88, Feb. 1981.

C. Díaz and A. Serjantov, “Generalising mixes,” in Proc. 3rd Int. Workshop Privacy Enhancing Technol., 2003, pp. 18–31.

D. Kesdogan, J. Egner, and R. Büschkes, “Stopand-go-MIXes providing probabilistic anonymity in an open system,” in Proc. 2nd Int. Workshop Inf. Hiding (IH), vol. 1525. Portland, OR, USA, Apr. 1998, pp. 83–98.

G. Danezis and L. Sassaman, “Heartbeat traffic to counter (n-1) attacks: Red-green-black mixes,” in Proc. ACM Workshop Privacy Electron. Soc., 2003, pp. 89–93.

C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, 1949.