Route fingerprinting in anonymous communications
Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), 2006•ieeexplore.ieee.org
Peer discovery and route set-up are an integral part of the processes by which anonymizing
peer-to-peer systems are made secure. When systems are large, and individual nodes only
gain random knowledge of part of the network, their traffic can be detected by the
uniqueness of the information they have learnt. We discuss this problem, which occurred in
the initial design of Tarzan, and other related problems from the literature
peer-to-peer systems are made secure. When systems are large, and individual nodes only
gain random knowledge of part of the network, their traffic can be detected by the
uniqueness of the information they have learnt. We discuss this problem, which occurred in
the initial design of Tarzan, and other related problems from the literature
Peer discovery and route set-up are an integral part of the processes by which anonymizing peer-to-peer systems are made secure. When systems are large, and individual nodes only gain random knowledge of part of the network, their traffic can be detected by the uniqueness of the information they have learnt. We discuss this problem, which occurred in the initial design of Tarzan, and other related problems from the literature
ieeexplore.ieee.org