Advertisement

Unobservable Rendezvous Negotiation in P2P Networks

  • Fanwen Xu
  • Qingfeng Tan
  • Jinqiao Shi
  • Li Guo
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 320)

Abstract

Internet has been the most popular platform for individuals to communicate and share ideas. With increasing threats against network privacy, anonymous and covert communication technology is becoming more and more important. In this paper, an unobservable rendezvous negotiation protocol is proposed based on P2P architecture, which establishes a covert channel leveraging an existing DHT to hide communicating behaviors and utilizes a tagging mechanism to ensure an indirect identification and mutual authentication. Experiments indicate that performance of the protocol is acceptable, and security analysis shows that the protocol can resist various threats.

Keywords

rendezvous negotiation covert channel P2P 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: a distributed anonymousinforma-tion storage and retrieval system. In: International workshop on Designingprivacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp. 46–66. Springer-Verlag New York, Inc., New York (2001)Google Scholar
  2. 2.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onionrouter. In: Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004, vol. 13, p. 21. USENIX Association, Berkeley (2004)Google Scholar
  3. 3.
    Isdal, T., Piatek, M., Krishnamurthy, A., Anderson, T.: Privacy-preserving p2pdata sharing with oneswarm. SIGCOMM Comput. Commun. Rev. 40(4), 111–122 (2010)CrossRefGoogle Scholar
  4. 4.
  5. 5.
    Li, Z., Sun, X., Wang, B., Wang, X.: A steganography scheme in p2p network. In: Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008, pp. 20–24. IEEE Computer Society, Washington, DC (2008)CrossRefGoogle Scholar
  6. 6.
  7. 7.
    Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., Karger, D.: Infra-net:Circumventing web censorship and surveillance. In: Proceedings of the 11th USENIX Security Symposium, pp. 247–262. USENIX Association, Berkeley (2002)Google Scholar
  8. 8.
    Burnett, S., Feamster, N., Vempala, S.: Chipping away at censorship firewalls withuser-generated content. In: Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010, p. 29. USENIX Association, Berkeley (2010)Google Scholar
  9. 9.
    Tsudik, G., Xu, S.: A Flexible Framework for Secret Handshakes. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 295–315. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. 10.
    Eidenbenz, R., Locher, T., Wattenhofer, R.: Hidden communication in p2p net-works steganographic handshake and broadcast. In: 2011 Proceedings IEEE, INFOCOM, pp. 954–962 (April 2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Fanwen Xu
    • 1
    • 4
  • Qingfeng Tan
    • 2
    • 3
  • Jinqiao Shi
    • 2
    • 3
  • Li Guo
    • 2
    • 3
  1. 1.Department of Computer ScienceBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.Chinese National Engineering Laboratory for Information Security TechnologiesBeijingChina
  3. 3.Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  4. 4.Key Laboratory of Trustworthy Distributed Computing and Service (BUPT)Ministry of EducationBeijingChina

Personalised recommendations