2008
DOI: 10.1016/j.comnet.2007.11.011
|View full text |Cite
|
Sign up to set email alerts
|

MuON: Epidemic based mutual anonymity in unstructured P2P networks

Abstract: A mutual anonymity system enables communication between a client and a service provider without revealing their identities. In general, the anonymity guarantees made by the protocol are enhanced when a large number of participants are recruited into the anonymity system. Peer-to-peer (P2P) systems are able to attract a large number of nodes and hence are highly suitable for anonymity systems. However, the churn (changes in system membership) within P2P networks, poses a significant challenge for low-bandwidth … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 53 publications
(95 reference statements)
0
6
0
Order By: Relevance
“…MuON [8] achieves higher bandwidth efficiency while preserving the level of anonymity of broadcasting.…”
Section: Related Workmentioning
confidence: 99%
“…MuON [8] achieves higher bandwidth efficiency while preserving the level of anonymity of broadcasting.…”
Section: Related Workmentioning
confidence: 99%
“…A number of applications based on Epidemic protocols have been proposed to serve different purposes in different environments. For example, Epidemic protocols have been employed to implement applications for Peer-to-Peer (P2P) overlay networks [1,2,3], distributed computing [4], mobile ad hoc networks (MANET) [5], wireless sensor networks (WSN) [6,7,8,9,10], failure detection [11], distributed data mining [12,13,14] and exascale high performance computing [15,16,17].…”
Section: Introductionmentioning
confidence: 99%
“…Applications based on epidemic protocols for large and extreme-scale networked systems are emerging in many fields, including Peer-to-Peer (P2P) overlay networks [1], distributed computing [2], mobile ad hoc networks (MANET) [3], wireless sensor networks (WSN) [4] and exascale high performance computing [5,6].…”
Section: Introductionmentioning
confidence: 99%