Unobservable Rendezvous Negotiation in P2P Networks

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet has been the most popular platform for individuals to communicate and share ideas. With increasing threats against network privacy, anonymous and covert communication technology is becoming more and more important. In this paper, an unobservable rendezvous negotiation protocol is proposed based on P2P architecture, which establishes a covert channel leveraging an existing DHT to hide communicating behaviors and utilizes a tagging mechanism to ensure an indirect identification and mutual authentication. Experiments indicate that performance of the protocol is acceptable, and security analysis shows that the protocol can resist various threats. © Springer-Verlag Berlin Heidelberg 2013.

Cite

CITATION STYLE

APA

Xu, F., Tan, Q., Shi, J., & Guo, L. (2013). Unobservable Rendezvous Negotiation in P2P Networks. In Communications in Computer and Information Science (Vol. 320, pp. 380–387). Springer Verlag. https://doi.org/10.1007/978-3-642-35795-4_48

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free