Download now Free registration required
The authors consider using trust information to improve the anonymity provided by onion-routing networks. In particular, they introduce a model of trust in network nodes and use it to design path-selection strategies that minimize the probability that the adversary can successfully control the entrance to and exit from the network. This minimizes the chance that the adversary can observe and correlate patterns in the data flowing over the path and thereby deanonymize the user. They first describe the general case in which onion routers can be assigned arbitrary levels of trust.
- Format: PDF
- Size: 197.8 KB