Source Anonymity using multiple mixes in Packet Scheduling
Main Article Content
Abstract
-Secret communication, where users converse without revealing the personalities of communicating parties or the trails of data stream is critical in data networks. On the Internet, Chaum mixes, intermediate nodes, or proxy servers, which use coated encryption and packet shuffling techniques to hide source identities, are used to provide anonymity to network users. In this analysis, an information theoretic structure is developed to study the maximum anonymity possible by packet shuffling when the merges are memory restricted—in other words, they can store a finite number of packets. Network of mixes over receiving packet sources from an eavesdropper’s perspective as the measure of secrecy, the maximum achievable secrecy of a single mix with buffer size b (packets which contains the source and destination details of itself ) serving for achieving multiple mixes (network of mixes). By obtaining network of mixes the source anonymity is achieved successfully. For a general multiuser system, the maximum anonymity as buffer size b→∞ is shown to approach the entropy of the source arrival probabilities at a convergence rate no less significant than 1/b2 . When the arrival probabilities of the general multiuser system can be expressed as a rational portion k/2 n for some fixed n, this union rate is shown to be achievable. The secrecy analysis is extended to a common network of mixes linking the sources to multi destination, where the source secrecy achievable on the target link is shown to be lower enclosed by a weighted sum of the secrecy achievable by each individual mix
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
Abhishek Mishra ; ECE Department, Lehigh University, ; Parv Venkitasubramaniam “Anonymity and Fairness in Packet Scheduling: A Quantitative Tradeoff” DOI: 10.1109/CISS.2012.6310742
N. West, The SIGINT Secrets: The Signals Intelligence War, 1900 to Today. New York, NY, USA: William Marrow, 1988.
U. S. Navy, “Military study, communication intelligence research activities,” Dept. Navy Library, Washington Navy Yard, Washington, DC, USA, Tech. Rep. SRH-151, Jun. 1937.
A. Back, U. Möller, and A. Stiglic, “Traffic analysis attacks and tradeoffs in anonymity providing systems,” in Proc. 4th Int. Inf. Hiding Workshop, Pittsburg, PA, USA, Apr. 2001, pp. 245–257.
J.-F. Raymond, “Traffic analysis: Protocols, attacks, design issues, and open problems,” in Proc. Int. Workshop Designing Privacy Enhancing Technol., Design Issues Anonymity Unobservability, LNCS vol. 2009. 2001, pp. 10–29.
D. L. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Commun. ACM, vol. 24, no. 2, pp. 84–88, Feb. 1981.
C. Díaz and A. Serjantov, “Generalising mixes,” in Proc. 3rd Int. Workshop Privacy Enhancing Technol., 2003, pp. 18–31.
D. Kesdogan, J. Egner, and R. Büschkes, “Stopand-go-MIXes providing probabilistic anonymity in an open system,” in Proc. 2nd Int. Workshop Inf. Hiding (IH), vol. 1525. Portland, OR, USA, Apr. 1998, pp. 83–98.
G. Danezis and L. Sassaman, “Heartbeat traffic to counter (n-1) attacks: Red-green-black mixes,” in Proc. ACM Workshop Privacy Electron. Soc., 2003, pp. 89–93.
C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, 1949.