메뉴 건너뛰기




Volumn 14, Issue 2, 2012, Pages 579-606

Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics

Author keywords

Anonymity; anonymity metrics; security; taxonomy; wired networks; wireless networks

Indexed keywords

ANONYMITY; ANONYMITY AND PRIVACY; ANONYMITY METRICS; ANONYMITY PROPERTY; ANONYMOUS COMMUNICATION; ANONYMOUS NETWORKS; ANONYMOUS PROTOCOL; CYBER-ATTACKS; CYBERSPACES; NATIONAL STRATEGIES; NETWORK TYPES; SECURITY; TREE-BASED; WIRED NETWORKS;

EID: 84860889609     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2011.042011.00080     Document Type: Review
Times cited : (29)

References (129)
  • 4
    • 4944262982 scopus 로고    scopus 로고
    • Herbivore: A scalable and efficient protocol for anonymous communication
    • S. Goel, M. Robson, M. Polte, and E. Sirer, "Herbivore: A Scalable and Efficient Protocol for Anonymous Communication," Cornell University,2003.
    • (2003) Cornell University
    • Goel, S.1    Robson, M.2    Polte, M.3    Sirer, E.4
  • 11
    • 33748622050 scopus 로고    scopus 로고
    • MASK: Anonymous on-demand routing in mobile Ad Hoc networks
    • DOI 10.1109/TWC.2006.1687761, 1687761
    • Z. Zhang, W. Liu, and Y. Fang, "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks," IEEE Trans. Wireless Commun., vol. 5, pp.2376-2385, Sept.2006. (Pubitemid 44376150)
    • (2006) IEEE Transactions on Wireless Communications , vol.5 , Issue.9 , pp. 2376-2385
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 13
    • 0029451888 scopus 로고
    • Untraceability in mobile networks
    • D. Samfat, R. Molva, and N. Asokan, "Untraceability in Mobile Networks," ACM MOBICOM, pp.26-36,1995.
    • (1995) ACM MOBICOM , pp. 26-36
    • Samfat, D.1    Molva, R.2    Asokan, N.3
  • 14
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • DOI 10.1109/TWC.2004.842941
    • M. Zhang and Y. Fang, "Security Analysis and Enhancements of3GPP Authentication and Key Agreement Protocol," IEEE Trans. Wireless Commun., vol.4, pp.734-742,2005. (Pubitemid 40519754)
    • (2005) IEEE Transactions on Wireless Communications , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.1    Fang, Y.2
  • 17
    • 35449005656 scopus 로고    scopus 로고
    • Anonymous and authenticated key exchange for roaming networks
    • DOI 10.1109/TWC.2007.06020042
    • Y. G., D. Wong, and X. Deng, "Anonymous and Authenticated Key Exchange for Roaming Networks," IEEE Trans. Wireless Commun., vol.6, pp.3461-3472,2007. (Pubitemid 47625225)
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.9 , pp. 3461-3472
    • Yang, G.1    Wong, D.S.2    Deng, X.3
  • 18
    • 42549171566 scopus 로고    scopus 로고
    • SAS: A simple anonymity scheme for clustered wireless sensor networks
    • DOI 10.1109/ICC.2006.255600, 4025001, 2006 IEEE International Conference on Communications, ICC 2006
    • S. Misra and G. Xue, "SAS: A Simple Anonymity Scheme for Clustered Wireless Sensor Networks," in IEEE International Conference on Communications (ICC), pp.3414-3419,2006. (Pubitemid 351576002)
    • (2006) IEEE International Conference on Communications , vol.8 , pp. 3414-3419
    • Misra, S.1    Guoliang, X.2
  • 22
    • 0035215230 scopus 로고    scopus 로고
    • Evaluation of anonymity providing techniques using queuing theory
    • D. Kesdogan, "Evaluation of anonymity providing techniques using queuing theory," in26th Annual IEEE Conference on Local Computer Networks (LCN) Tampa FL, USA, pp.316-322,2001. (Pubitemid 33148879)
    • (2001) Conference on Local Computer Networks , pp. 316-322
    • Kesdogan, D.1
  • 24
    • 84860886799 scopus 로고    scopus 로고
    • Performance evaluation of anonymous routing protocols in manets
    • J. Liu, J. Kong, X. Hong, and M. Gerla, "Performance Evaluation of Anonymous Routing Protocols in MANETs," University of Alabama, p.6,2005.
    • (2005) University of Alabama , pp. 6
    • Liu, J.1    Kong, J.2    Hong, X.3    Gerla, M.4
  • 28
    • 40249087829 scopus 로고    scopus 로고
    • Towards a framework for connection anonymity
    • H. Tillwick and M. Olivier, "Towards a Framework for Connection Anonymity," in SAICSIT, pp.113-122,2005.
    • (2005) SAICSIT , pp. 113-122
    • Tillwick, H.1    Olivier, M.2
  • 30
    • 51849113964 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • B. Gedik and L. Liu, "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms," IEEE Trans. Mobile Computing, vol.6,2007.
    • (2007) IEEE Trans. Mobile Computing , vol.6
    • Gedik, B.1    Liu, L.2
  • 32
    • 70449514631 scopus 로고    scopus 로고
    • Anonymous communication on the internet
    • A. Jones, "Anonymous Communication on the Internet," Indiana Unversity,2004, p.13.
    • (2004) Indiana Unversity , pp. 13
    • Jones, A.1
  • 34
    • 33947418087 scopus 로고    scopus 로고
    • A survey on mix networks and their secure applications
    • K. Sampigethaya and R. Poovendran, "A Survey on Mix Networks and Their Secure Applications," IEEE, vol.94, pp.2142-2181,2006.
    • (2006) IEEE , vol.94 , pp. 2142-2181
    • Sampigethaya, K.1    Poovendran, R.2
  • 37
    • 33745945444 scopus 로고    scopus 로고
    • AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks
    • DOI 10.1145/1102219.1102226, SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
    • R. Song, L. Korba, and G. Yee, "AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-hoc Networks," in3rd ACM Workshop on Security of Ad hoc and Sensor Networks Alexandria VA, USA, pp.33-42,2005. (Pubitemid 44059928)
    • (2005) SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks , vol.2005 , pp. 33-42
    • Song, R.1    Korba, L.2    Yee, G.3
  • 38
    • 20544471574 scopus 로고    scopus 로고
    • SDAR: A Secure Distributed Anonymous Routing protocol for wireless and mobile ad hoc networks
    • Proceedings - 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004
    • A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, "SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks," in29th Annual IEEE International Conference on Local Computer Networks, pp.618-624,2004. (Pubitemid 40845289)
    • (2004) Proceedings - Conference on Local Computer Networks, LCN , pp. 618-624
    • Boukerche, A.1    El-Khatib, K.2    Xu, L.3    Korba, L.4
  • 40
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • January
    • D. L. Chaum, "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability," Journal of Cryptology, vol.1, pp.65-75, January,1988.
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.L.1
  • 46
    • 84860885423 scopus 로고    scopus 로고
    • Prive: Anonymous location-based queries in distributed mobile systems
    • National University of Singapore, Singapore
    • G. Ghinita, P. Kalnis, and S. Skiadopoulos, "PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems," Department of Computer Science, National University of Singapore, Singapore,2006.
    • (2006) Department of Computer Science
    • Ghinita, G.1    Kalnis, P.2    Skiadopoulos, S.3
  • 47
  • 48
    • 63749090408 scopus 로고    scopus 로고
    • Odar: On-demand anonymous routing in ad hoc networks
    • University of California
    • D. Sy, R. Chen, and L. Bao, "ODAR: On-Demand Anonymous Routing in Ad Hoc Networks," University of California, Irvine, pp.1-10,2006.
    • (2006) Irvine , pp. 1-10
    • Sy, D.1    Chen, R.2    Bao, L.3
  • 49
    • 22944492132 scopus 로고    scopus 로고
    • AO2P: Ad hoc on-demand position-based private routing protocol
    • DOI 10.1109/TMC.2005.50
    • X. Wu and B. Bhargava, "AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol," IEEE Trans. Mobile Computing, vol.4, pp.335-348,2005. (Pubitemid 41049891)
    • (2005) IEEE Transactions on Mobile Computing , vol.4 , Issue.4 , pp. 335-348
    • Wu, X.1    Bhargava, B.2
  • 50
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. L. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Communications of the ACM, vol.24, pp.84-88, February1981.
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.L.1
  • 55
    • 20344398437 scopus 로고    scopus 로고
    • Security limitations of an authorized anonymous ID-based scheme for mobile communication
    • DOI 10.1109/MCOM.2005.1453437
    • R. Phan, "Security limitations of an authorized anonymous ID-based scheme for mobile communication," in Communications Mag.. vol.43, pp.149-153,2005. (Pubitemid 40784480)
    • (2005) IEEE Communications Magazine , vol.43 , Issue.5 , pp. 149-153
    • Phan, R.C.-W.1
  • 57
    • 0036312325 scopus 로고    scopus 로고
    • Hordes: A multicast-based protocol for anonymity
    • B. Levine and C. Shields, "Hordes: A Multicast-based Protocol for Anonymity," Journal of Computer Security, vol.10, pp.213-240,2002
    • (2002) Journal of Computer Security , vol.10 , pp. 213-240
    • Levine, B.1    Shields, C.2
  • 64
    • 2542616812 scopus 로고    scopus 로고
    • Quest for personal control over mobile location privacy
    • Q. He, D. Wu, and P. Khosla, "Quest for Personal Control over Mobile Location Privacy," in IEEE Commun. Mag.. vol.45, pp.130-136,2004.
    • (2004) IEEE Commun. Mag.. , vol.45 , pp. 130-136
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 65
    • 50249092669 scopus 로고    scopus 로고
    • Subscriptionless mobile networking: Anonymity and privacy aspects within personal area networks
    • M. Schmidt, "Subscriptionless Mobile Networking: Anonymity and Privacy Aspects within Personal Area Networks," in IEEE in Wireless Communications and Networking Conference (WCNC), pp.869-875,2002.
    • (2002) IEEE in Wireless Communications and Networking Conference (WCNC) , pp. 869-875
    • Schmidt, M.1
  • 66
    • 34347244961 scopus 로고    scopus 로고
    • An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks
    • DOI 10.1109/TMC.2007.1021
    • J. Kong, X. Hong, and M. Gerla, "An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol.6, pp.888-902,2007. (Pubitemid 46993988)
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.8 , pp. 888-902
    • Kong, J.1    Hong, X.2    Gerla, M.3
  • 69
  • 70
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable erros
    • July
    • B. H. Bloom, "Space/time Trade-offs in Hash Coding with Allowable Erros," Communications of the ACM, vol.13, pp.422-426, July1970.
    • (1970) Communications of the ACM , vol.13 , pp. 422-426
    • Bloom, B.H.1
  • 71
    • 84860882966 scopus 로고    scopus 로고
    • A new approach to anonymous multicast routing in ad hoc networks
    • L. Bao, "A New Approach to Anonymous Multicast Routing in Ad Hoc Networks," in CHINACOM,2007.
    • (2007) CHINACOM
    • Bao, L.1
  • 72
    • 38549121414 scopus 로고    scopus 로고
    • ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks
    • DOI 10.1109/ICC.2007.211, 4288882, 2007 IEEE International Conference on Communications, ICC'07
    • X. Lin, R. Lu, H. Zhu, P. Ho, and Z. Cao, "ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks," in IEEE International Conference on Communications (ICC), Glasgow, pp.1247-1253,2007. (Pubitemid 351145708)
    • (2007) IEEE International Conference on Communications , pp. 1247-1253
    • Lin, X.1    Lu, R.2    Zhu, H.3    Ho, P.-H.4    Shen, X.5    Cao, Z.6
  • 76
    • 22944492132 scopus 로고    scopus 로고
    • AO2P: Ad hoc on-demand position-based private routing protocol
    • DOI 10.1109/TMC.2005.50
    • X. Wu and B. Bhargava, "AO2P: Ad hoc On-demand Position-based Private Routing Protocol," in IEEE Trans. Mobile Computing. vol.4, pp.335-348,2005. (Pubitemid 41049891)
    • (2005) IEEE Transactions on Mobile Computing , vol.4 , Issue.4 , pp. 335-348
    • Wu, X.1    Bhargava, B.2
  • 77
    • 4544285741 scopus 로고    scopus 로고
    • Distributed clustering in ad hoc sensor networks: A hybrid, energy-efficient approach
    • O. Younis and S. Fahmy, "Distributed Clustering in Ad Hoc Sensor Networks: A Hybrid, Energy-Efficient Approach," in INFOCOM, pp.629-640,2004.
    • (2004) INFOCOM , pp. 629-640
    • Younis, O.1    Fahmy, S.2
  • 78
    • 70449512517 scopus 로고    scopus 로고
    • Anonymous surfing with java anonymous proxy
    • T. Eggendorfer, "Anonymous Surfing with Java Anonymous Proxy," in Linux Magazine, pp.44-46,2005.
    • (2005) Linux Magazine , pp. 44-46
    • Eggendorfer, T.1
  • 81
    • 70449481699 scopus 로고    scopus 로고
    • Mixmaster protocol version3
    • L. Cottrell, "Mixmaster Protocol Version3," Anonymizer Inc.,2001.
    • (2001) Anonymizer Inc.
    • Cottrell, L.1
  • 83
    • 17144430885 scopus 로고    scopus 로고
    • Security analysis and enhancements of 3GPP authentication and key agreement protocol
    • DOI 10.1109/TWC.2004.842941
    • M. Zhang and Y. Fang, "Security Analysis and Enhancements of3GPP Authentication and Key Agreement Protocol," IEEE Trans. Wireless Commun., vol.4, pp.734-742, 04 April2005. (Pubitemid 40519754)
    • (2005) IEEE Transactions on Wireless Communications , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.1    Fang, Y.2
  • 84
    • 35449005656 scopus 로고    scopus 로고
    • Anonymous and authenticated key exchange for roaming networks
    • DOI 10.1109/TWC.2007.06020042
    • Y. G., D. Wong, and X. Deng, "Anonymous and Authenticated Key Exchange for Roaming Networks," IEEE Trans. Wireless Commun., vol.6, pp.3461-3472, September2007. (Pubitemid 47625225)
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.9 , pp. 3461-3472
    • Yang, G.1    Wong, D.S.2    Deng, X.3
  • 85
    • 0029451888 scopus 로고
    • Untraceability in mobile networks
    • D. Samfat, R. Molva, and N. Asokan, "Untraceability in Mobile Networks," ACM MOBICOM, pp.26-36,1995.
    • (1995) ACM MOBICOM , pp. 26-36
    • Samfat, D.1    Molva, R.2    Asokan, N.3
  • 86
    • 36949008722 scopus 로고    scopus 로고
    • Anonymity loves company: Anonymous web transactions with crowds
    • ACM
    • M. Reiter and A. Rubin, "Anonymity loves company: Anonymous Web transactions with Crowds," Communications of the ACM, vol.42,1999.
    • (1999) Communications of the , vol.42
    • Reiter, M.1    Rubin, A.2
  • 87
    • 24344501784 scopus 로고    scopus 로고
    • Measuring anonymity in a non-adaptive, real-time system
    • G. Toth and Z. Hornak, "Measuring Anonymity in a Non-adaptive, Real-time System," Privacy Enhancing Technologies workshop (PET), vol.3424, pp.226-241,2004.
    • (2004) Privacy Enhancing Technologies workshop (PET) , vol.3424 , pp. 226-241
    • Toth, G.1    Hornak, Z.2
  • 92
    • 46149110091 scopus 로고    scopus 로고
    • On measuring anonymity for wireless mobile ad-hoc networks
    • H. Dijiang, "On Measuring Anonymity For Wireless Mobile Ad-hoc Networks," in31st IEEE Local Computer Networks Conference, pp.779-786,2006.
    • (2006) 31st IEEE Local Computer Networks Conference , pp. 779-786
    • Dijiang, H.1
  • 99
    • 77249166657 scopus 로고    scopus 로고
    • Anonymous user communication for privacy protection in wireless metropolitan mesh network
    • Z. Wan, K.. Ren, B. Zhu, B. Preneel, and M.. Gu, "Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Network," IEEE Trans. Vehicular Technology, Vol. 59, Issue2, pp. 519-532,2010.
    • (2010) IEEE Trans. Vehicular Technology , vol.59 , Issue.2 , pp. 519-532
    • Wan, Z.1    Ren, K.2    Zhu, B.3    Preneel, B.4    M. Gu5
  • 102
    • 76949104041 scopus 로고    scopus 로고
    • Efficient id-based registration protocol featured with user anonymity in mobile ip networks
    • L. Dang, W. Kou, H. Li, J.. Zhang, X. Cao, B. Zhao, and K. Fan, "Efficient ID-based Registration Protocol Featured with User Anonymity in Mobile IP Networks," IEEE Trans. Wireless Commun., Vol.9, Issue2, pp. 594-604,2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.2 , pp. 594-604
    • Dang, L.1    Kou, W.2    Li, H.3    Zhang, J.4    Cao, X.5    Zhao, B.6    Fan, K.7
  • 106
    • 44049096615 scopus 로고    scopus 로고
    • Secure anonymous group infrastructure for common and future internet applications
    • N. Weiler, "Secure Anonymous Group Infrastructure for Common and Future Internet Applications," in Computer Security Applications Conference,2001.
    • (2001) Computer Security Applications Conference
    • Weiler, N.1
  • 108
    • 1942500486 scopus 로고    scopus 로고
    • A quantitative analysis of anonymous communications
    • Y. Guan, X. Fu, R. Bettai, and W. Zhao, "A Quantitative Analysis of Anonymous Communications," IEEE Trans. Reliability, Vol. 53, pp.103-115,2004.
    • (2004) IEEE Trans. Reliability , vol.53 , pp. 103-115
    • Guan, Y.1    Fu, X.2    Bettai, R.3    Zhao, W.4
  • 116
    • 45749109010 scopus 로고    scopus 로고
    • Sybilguard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "SybilGuard: Defending against Sybil Attacks via Social Networks," IEEE/ACM Trans. Netw., Vol.16, Issue3, pp. 576-589,2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.3 , pp. 576-589
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4
  • 117
    • 84860885418 scopus 로고    scopus 로고
    • Responder anonymity and anonymous peer-to-peer file sharing
    • V. Scarlata, N. Levine, and C. Shields, "Responder Anonymity and Anonymous Peer-to-Peer File Sharing," in Proc. IEEE INCP,2001.
    • (2001) Proc. IEEE INCP
    • Scarlata, V.1    Levine, N.2    Shields, C.3
  • 122
    • 79960704657 scopus 로고    scopus 로고
    • House of Lords European Union Committee 5th Report of Session2009-10
    • House of Lords European Union Committee, "Protecting Europe against Large-scale Cyber-attacks", 5th Report of Session2009-10, http://www.publications.parliament.uk/pa/ld200910/ldselect/ldeucom/68/68.pdf, 2010
    • (2010) Protecting Europe against Large-scale Cyber-attacks"
  • 123
    • 80053465803 scopus 로고    scopus 로고
    • The White House Office of the Press Secretary
    • The White House Office of the Press Secretary, "Remarks by the President on Securing Our Nation's Cyber Infrastructure," www.whiteshouse.gov, http://www.whitehouse.gov/the-press-office/remarks- president-securing-our-nations-cyber-infrastructure,2009
    • (2009) Remarks by the President on Securing Our Nation's Cyber Infrastructure
  • 125
    • 81055157666 scopus 로고    scopus 로고
    • Denial of service attacks in wireless networks: The case of jammers
    • K. Pelechrinis, M. Iliofotou, and V. Krishnamurthy, "Denial of Service Attacks in Wireless Networks: The Case of Jammers," IEEE Commun. Surveys Tuts., Vol. PP, Issue99, pp.1-13,2010.
    • (2010) IEEE Commun. Surveys Tuts. , Issue.99 PP , pp. 1-13
    • Pelechrinis, K.1    Iliofotou, M.2    Krishnamurthy, V.3
  • 127
    • 84856161231 scopus 로고    scopus 로고
    • A survey of trust management for mobile ad hoc networks
    • J. Cho, A. Swami, and I. Chen, "A Survey of Trust Management for Mobile Ad Hoc Networks, "IEEE Commun. Surveys Tuts., Vol. PP, Issue99, pp.1-22,2010.
    • (2010) IEEE Commun. Surveys Tuts. , Issue.99 PP , pp. 1-22
    • Cho, J.1    Swami, A.2    Chen, I.3
  • 128
    • 77955065766 scopus 로고    scopus 로고
    • Host identity protocol (hip): Connectivity, mobility, multi-homing, security, and privacy over ipv4 and ipv6 networks
    • P. Nikander, A. Gurtov, and T.R. Henderson, "Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks," IEEE Commun. Surveys Tuts., Vol.12, Issue2, pp.186-204,2010.
    • (2010) IEEE Commun. Surveys Tuts. , vol.12 , Issue.2 , pp. 186-204
    • Nikander, P.1    Gurtov, A.2    Henderson, T.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.