AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks
碩士 === 國立交通大學 === 網路工程研究所 === 96 === Anonymity is important for both data request or response in overlay networks. Overlay routing reveals information since it requires identity to locate data. We proposed an Anonymous and FAult-TOlerant Routing protocol (AFATOR), which provides anonymity against ad...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/04631585323913674411 |
id |
ndltd-TW-096NCTU5726075 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096NCTU57260752015-10-13T12:18:06Z http://ndltd.ncl.edu.tw/handle/04631585323913674411 AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks 在疊蓋式網路中的匿名且容錯的路由協定 Chia-Chen Wu 吳佳貞 碩士 國立交通大學 網路工程研究所 96 Anonymity is important for both data request or response in overlay networks. Overlay routing reveals information since it requires identity to locate data. We proposed an Anonymous and FAult-TOlerant Routing protocol (AFATOR), which provides anonymity against adversaries, and tolerance of node failures. We randomly select intermediate nodes to forward the messages and use layered encryptions to hide the originator from the intermediate nodes. We also apply Fuzzy Identity-Based Encryption (Fuzzy-IBE) scheme for tolerance of node failures in the routing path. Leveraging Fuzzy-IBE, a user can decrypt a ciphertext encrypted with other's public key if and only if the two users are within a certain distance. Thus, a node can easily take over message forwarding if its neighbor node fails. Analysis of anonymity and failure tolerance of the proposed protocol is also given. Shiuhpyng Shieh 謝續平 2008 學位論文 ; thesis 54 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 網路工程研究所 === 96 === Anonymity is important for both data request or response in overlay networks. Overlay routing reveals information since it requires identity to locate data. We proposed an Anonymous and FAult-TOlerant Routing protocol (AFATOR), which provides anonymity against adversaries, and tolerance of node failures. We randomly select intermediate nodes to forward the messages and use layered encryptions to hide the originator from the intermediate nodes. We also apply Fuzzy Identity-Based Encryption (Fuzzy-IBE) scheme for tolerance of node failures in the routing path. Leveraging Fuzzy-IBE, a user can decrypt a ciphertext encrypted with other's public key if and only if the two users are within a certain distance. Thus, a node can easily take over message forwarding if its neighbor node fails. Analysis of anonymity and failure tolerance of the proposed protocol is also given.
|
author2 |
Shiuhpyng Shieh |
author_facet |
Shiuhpyng Shieh Chia-Chen Wu 吳佳貞 |
author |
Chia-Chen Wu 吳佳貞 |
spellingShingle |
Chia-Chen Wu 吳佳貞 AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks |
author_sort |
Chia-Chen Wu |
title |
AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks |
title_short |
AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks |
title_full |
AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks |
title_fullStr |
AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks |
title_full_unstemmed |
AFATOR: Anonymous and FAult-TOlerant Routing in overlay networks |
title_sort |
afator: anonymous and fault-tolerant routing in overlay networks |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/04631585323913674411 |
work_keys_str_mv |
AT chiachenwu afatoranonymousandfaulttolerantroutinginoverlaynetworks AT wújiāzhēn afatoranonymousandfaulttolerantroutinginoverlaynetworks AT chiachenwu zàidiégàishìwǎnglùzhōngdenìmíngqiěróngcuòdelùyóuxiédìng AT wújiāzhēn zàidiégàishìwǎnglùzhōngdenìmíngqiěróngcuòdelùyóuxiédìng |
_version_ |
1716857921425375232 |