AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks

碩士 === 國立交通大學 === 網路工程研究所 === 96 === Anonymity is important for both data request or response in overlay networks. Overlay routing reveals information since it requires identity to locate data. We proposed an Anonymous and FAult-TOlerant Routing protocol (AFATOR), which provides anonymity against ad...

Full description

Bibliographic Details
Main Authors: Chia-Chen Wu, 吳佳貞
Other Authors: Shiuhpyng Shieh
Format: Others
Language:en_US
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/04631585323913674411
id ndltd-TW-096NCTU5726075
record_format oai_dc
spelling ndltd-TW-096NCTU57260752015-10-13T12:18:06Z http://ndltd.ncl.edu.tw/handle/04631585323913674411 AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks 在疊蓋式網路中的匿名且容錯的路由協定 Chia-Chen Wu 吳佳貞 碩士 國立交通大學 網路工程研究所 96 Anonymity is important for both data request or response in overlay networks. Overlay routing reveals information since it requires identity to locate data. We proposed an Anonymous and FAult-TOlerant Routing protocol (AFATOR), which provides anonymity against adversaries, and tolerance of node failures. We randomly select intermediate nodes to forward the messages and use layered encryptions to hide the originator from the intermediate nodes. We also apply Fuzzy Identity-Based Encryption (Fuzzy-IBE) scheme for tolerance of node failures in the routing path. Leveraging Fuzzy-IBE, a user can decrypt a ciphertext encrypted with other's public key if and only if the two users are within a certain distance. Thus, a node can easily take over message forwarding if its neighbor node fails. Analysis of anonymity and failure tolerance of the proposed protocol is also given. Shiuhpyng Shieh 謝續平 2008 學位論文 ; thesis 54 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 網路工程研究所 === 96 === Anonymity is important for both data request or response in overlay networks. Overlay routing reveals information since it requires identity to locate data. We proposed an Anonymous and FAult-TOlerant Routing protocol (AFATOR), which provides anonymity against adversaries, and tolerance of node failures. We randomly select intermediate nodes to forward the messages and use layered encryptions to hide the originator from the intermediate nodes. We also apply Fuzzy Identity-Based Encryption (Fuzzy-IBE) scheme for tolerance of node failures in the routing path. Leveraging Fuzzy-IBE, a user can decrypt a ciphertext encrypted with other's public key if and only if the two users are within a certain distance. Thus, a node can easily take over message forwarding if its neighbor node fails. Analysis of anonymity and failure tolerance of the proposed protocol is also given.
author2 Shiuhpyng Shieh
author_facet Shiuhpyng Shieh
Chia-Chen Wu
吳佳貞
author Chia-Chen Wu
吳佳貞
spellingShingle Chia-Chen Wu
吳佳貞
AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks
author_sort Chia-Chen Wu
title AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks
title_short AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks
title_full AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks
title_fullStr AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks
title_full_unstemmed AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks
title_sort afator: anonymous and fault-tolerant routing in overlay networks
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/04631585323913674411
work_keys_str_mv AT chiachenwu afatoranonymousandfaulttolerantroutinginoverlaynetworks
AT wújiāzhēn afatoranonymousandfaulttolerantroutinginoverlaynetworks
AT chiachenwu zàidiégàishìwǎnglùzhōngdenìmíngqiěróngcuòdelùyóuxiédìng
AT wújiāzhēn zàidiégàishìwǎnglùzhōngdenìmíngqiěróngcuòdelùyóuxiédìng
_version_ 1716857921425375232