Packet Replacement Technique for Securing Anonymity in P2P Network

KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 3, pp. 331-338, Jun. 2005
10.3745/KIPSTC.2005.12.3.331,   PDF Download:


Flooding based p2p system basically provides anonymity and under the anonymity circumstances user and provider exchange information. Most of packets transferred from node to node do not contain identity information on node that sent packet. And these packets are transmitted to the destination through the routing systems dynamically composed of intermediate nodes. Therefore it is impossible to know who transmitted it for the first and who the designated recipient is. But since downloading and uploading host´ IP address is exposed it does not provide anonymity. This study introduces techniques to provide anonymity for protecting identification of users and resource providers by replacing QueryHit packets in systems where anonymity can cause trouble.

Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.

Cite this article
[IEEE Style]
B. R. Kim and K. C. Kim, "Packet Replacement Technique for Securing Anonymity in P2P Network," KIPS Journal C (2001 ~ 2012) , vol. 12, no. 3, pp. 331-338, 2005. DOI: 10.3745/KIPSTC.2005.12.3.331.

[ACM Style]
Byung Ryong Kim and Ki Chang Kim. 2005. Packet Replacement Technique for Securing Anonymity in P2P Network. KIPS Journal C (2001 ~ 2012) , 12, 3, (2005), 331-338. DOI: 10.3745/KIPSTC.2005.12.3.331.