Packet Replacement Technique for Securing Anonymity in P2P Network


The KIPS Transactions:PartC, Vol. 12, No. 3, pp. 331-338, Jun. 2005
10.3745/KIPSTC.2005.12.3.331,   PDF Download:

Abstract

Flooding based p2p system basically provides anonymity and under the anonymity circumstances user and provider exchange information. Most of packets transferred from node to node do not contain identity information on node that sent packet. And these packets are transmitted to the destination through the routing systems dynamically composed of intermediate nodes. Therefore it is impossible to know who transmitted it for the first and who the designated recipient is. But since downloading and uploading host´ IP address is exposed it does not provide anonymity. This study introduces techniques to provide anonymity for protecting identification of users and resource providers by replacing QueryHit packets in systems where anonymity can cause trouble.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
B. R. Kim and K. C. Kim, "Packet Replacement Technique for Securing Anonymity in P2P Network," The KIPS Transactions:PartC, vol. 12, no. 3, pp. 331-338, 2005. DOI: 10.3745/KIPSTC.2005.12.3.331.

[ACM Style]
Byung Ryong Kim and Ki Chang Kim. 2005. Packet Replacement Technique for Securing Anonymity in P2P Network. The KIPS Transactions:PartC, 12, 3, (2005), 331-338. DOI: 10.3745/KIPSTC.2005.12.3.331.