Analyzing and Blocking Misbehaving User in Anonymizing Network
International Journal of Emerging Trends in Science and Technology,
Vol. 1 No. 05 (2014),
1 July 2014
Abstract
As we studied in our literature, the recent method was presented for blocking of misbehaving user in the Tor networks called as Nymble. However the first limitation which we identified for Nymble is that if the Nymble manager fails, then whole security system is fails second limitation is blocking IP address is not feasible because if we reconnect it we get new IP address by dynamic property IP addressing.Drawback of existing  system can be overcome by our proposed system i.e “Detection and Prevention of misbehaving users in anonymzing networkâ€. MAC address is used for blocking misbehaving users in anonymizing network. which cover MAC address as user identity, as IP address can be dynamically generated,it is not useful to solve above problem As ,we use MAC address, there is no chance for Sybil attack, as MAC address is physical address it cannot be change at any cost.As existing system is totally centralized to nymble manager, to overcome above all drawback, we use reliable system where second manager may handle task of first nymble manager failure.current system has scalability property as well as it  can handle multiple server requestsat a time  .We use strongly cryptography algorithm it’s hard to break security of our system.
Key Words:- Anonymizing, blacklisting, Sybil attack, MAC addresssHow to Cite
Download Citation
References
[2] Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Gene Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Mihir Bellare, editor, Advances in Cryptology — CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255–270. Springer Verlag, 2000.
[3] D.Chaum and E.van Heyst, “Group Signatures,†Proc.Int’l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT) pp.237-265, 1991.
[4] S. Brands, “Restrictive Blinding of Secret-Key Certificates,â€in Proceedings of EUROCRYPT 1995, Saint-Malo, France,May 1995.
[5] Boukerche, A.; El-Khatib, K.; Li Xu; Korba, L., SDAR: “A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networksâ€, IEEE Comput. Soc. 29 -2004.
[6] Ray Dillinger, Cyclopedia Cryptologia-an online encyclopedia of cryptographic protocols. http://www.disappearing-inc.com.
- Article Viewed: 27 Total Download