Tianbo Lu, Shixian Du, Yang Li, Peiyuan Dong, Xiaoyan Zhang
{"title":"A Framework for Analyzing Anonymous Network Topology","authors":"Tianbo Lu, Shixian Du, Yang Li, Peiyuan Dong, Xiaoyan Zhang","doi":"10.14257/IJFGCN.2015.8.4.01","DOIUrl":null,"url":null,"abstract":"Nowadays, Internet privacy becomes more and more important and sensitive, and has been one of the latest buzz words to hit the Internet world. In response to protect the privacy of Internet users, a variety of privacy enhancing technologies (PETs) have emerged. As one of privacy enhancing technologies, anonymous communication has been extensively studied from various aspects by researchers. Node churn is frequent in anonymous network, which make it difficult to maintain a stable network topology, therefore it is necessary to get more insight into the overall anonymous network topology. In this work, in order to better grasp the present situation of research, we investigate existing organizations and universities which study anonymous communication from the perspective of network topology, and related projects. Then we survey related papers to anonymous communication published in recent years, which focus on the analysis of node selection (especially in the Tor). In addition, we present a framework of anonymous communication network topology, and a visual illustration of this analysis that shows the progression of the research of network topology and node discovery in anonymous communication. Finally, some related problems and follow-up study are presented to be studied deeply in future.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Future Generation Communication and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJFGCN.2015.8.4.01","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Nowadays, Internet privacy becomes more and more important and sensitive, and has been one of the latest buzz words to hit the Internet world. In response to protect the privacy of Internet users, a variety of privacy enhancing technologies (PETs) have emerged. As one of privacy enhancing technologies, anonymous communication has been extensively studied from various aspects by researchers. Node churn is frequent in anonymous network, which make it difficult to maintain a stable network topology, therefore it is necessary to get more insight into the overall anonymous network topology. In this work, in order to better grasp the present situation of research, we investigate existing organizations and universities which study anonymous communication from the perspective of network topology, and related projects. Then we survey related papers to anonymous communication published in recent years, which focus on the analysis of node selection (especially in the Tor). In addition, we present a framework of anonymous communication network topology, and a visual illustration of this analysis that shows the progression of the research of network topology and node discovery in anonymous communication. Finally, some related problems and follow-up study are presented to be studied deeply in future.
期刊介绍:
The topics covered by IJFGCN include the following:- -Communication Basic and Infrastructure: *Algorithms, Architecture, and Infrastructures *Communication protocols *Communication Systems *Telecommunications *Transmission TechniquesEtc. -Networks Basic and Management: *Network Management Techniques *Network Modeling and Simulation *Network Systems and Devices *Networks Security, Encryption and Cryptography *Wireless Networks, Ad-Hoc and Sensor Networks *Etc. -Multimedia Application: *Digital Rights Management *Documents Monetization and Interpretation *Management and Diffusion of Multimedia Applications *Multimedia Data Base *Etc. -Image, Video, Signal and Information Processing: *Analysis and Processing *Compression and Coding *Information Fusion *Rationing Methods and Data mining *Etc.