A Random Walk Based Anonymous Peer-to-Peer Protocol Design

  • Jinsong Han
  • Yunhao Liu
  • Li Lu
  • Lei Hu
  • Abhishek Patil
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3619)


Anonymity has been one of the most challenging issues in Ad Hoc environment such as P2P systems. In this paper, we propose an anonymous protocol called Random Walk based Anonymous Protocol (RWAP), in decentralized P2P systems. We evaluate RWAP by comprehensive trace driven simulations. Results show that RWAP significantly reduces traffic cost and encryption overhead compared with existing approaches.


Query Message Malicious Peer Responder Anonymity Traffic Cost Anonymity Degree 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
    FIPS-197: Advanced Encryption Standard, National Institute of Standards and Technology (NIST),
  3. 3.
  4. 4.
    Gnutella Protocol Development,
  5. 5.
    The Gnutella Protocol Spedification v0.4,
  6. 6.
  7. 7.
  8. 8.
    Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web Caching and Zipf-like Distributions: Evidence and Implications. In: Proceedings of IEEE INFOCOM (1999)Google Scholar
  9. 9.
    Chawathe, Y., Ratnasamy, S., Breslau, L., Lanham, N., Shenker, S.: Making Gnutella-like P2P Systems Scalable. In: Proceedings of ACM SIGCOMM (2003)Google Scholar
  10. 10.
    Cohen, E., Shenker, S.: Replication Strategies in Unstructured Peer-to-peer Networks. In: Proceedings of ACM SIGCOMM (2002)Google Scholar
  11. 11.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (2004)Google Scholar
  12. 12.
    Gkantsidis, C., Mihail, M., Saberi, A.: Random Walks in Peer-to-Peer Networks. In: Proceedings of IEEE INFOCOM (2004)Google Scholar
  13. 13.
    Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, SOSP (2003)Google Scholar
  14. 14.
    Jia, W., Xuan, D., Tu, W., Lin, L., Zhao, W.: Distributed Admission Control for Anycast Flows. IEEE Transactions on Parallel and Distributed Systems, TPDS (2004)Google Scholar
  15. 15.
    Law, C., Siu, K.-Y.: Distributed Construction of Random Expander Networks. In: Proceedings of IEEE INFOCOM (2003)Google Scholar
  16. 16.
    Liu, Y., Liu, X., Xiao, L., Ni, L.M., Zhang, X.: Location-Aware Topology Matching in Unstructured P2P Systems. In: Proceedings of IEEE INFOCOM (2004)Google Scholar
  17. 17.
    Lv, Q., Cao, P., Edith, C., Li, K., Shenker, S.: Search and Replication in Unstructured Peer-to-Peer Networks. In: Proceedings of International Conference on Supercomputing (ICS 2002). ACM, New York (2002)Google Scholar
  18. 18.
    Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security (1998)Google Scholar
  19. 19.
    Rennhard, Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. In: Proceedings of ACM workshop on Privacy in the Electronic Society (2002)Google Scholar
  20. 20.
    Scarlata, V., Levine, B.N., Shields, C.: Responder Anonymity and Anonymous Peer-to-Peer File Sharing. In: Proceedings of the 9th International Conference of Network Protocol, ICNP (2001)Google Scholar
  21. 21.
    Shields, C., Levine, B.N.: A Protocol for Anonymous Communication over the Internet. In: Proceedings of 7th ACM Conference on Computer and Communication Security, ACM CCS (2000)Google Scholar
  22. 22.
    Xiao, L., Xu, Z., Zhang, X.: Low-cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Jinsong Han
    • 1
  • Yunhao Liu
    • 1
  • Li Lu
    • 2
  • Lei Hu
    • 2
  • Abhishek Patil
    • 3
  1. 1.Dept. of Computer ScienceHong Kong University of Science & TechnologyKowloon, Hong Kong
  2. 2.The State Key Laboratory of Information SecurityChinese Academy of SciencesBeijingChina
  3. 3.Dept. of Computer Science and EngineeringMichigan State UniversityEast LansingUSA

Personalised recommendations