dc.creator | Shen, Yiping | |
dc.date.accessioned | 2012-06-07T23:18:34Z | |
dc.date.available | 2012-06-07T23:18:34Z | |
dc.date.created | 2002 | |
dc.date.issued | 2002 | |
dc.identifier.uri | https://hdl.handle.net/1969.1/ETD-TAMU-2002-THESIS-S543 | |
dc.description | Due to the character of the original source materials and the nature of batch digitization, quality control issues may be present in this document. Please report any quality issues you encounter to digital@library.tamu.edu, referencing the URI of the item. | en |
dc.description | Includes bibliographical references (leaves 36-38). | en |
dc.description | Issued also on microfiche from Lange Micrographics. | en |
dc.description.abstract | In this thesis, we present unicast and multicast protocols to resist eavesdropping and traffic profiling of group communications. At the application layer, we propose a secret-sharing approach for the exchange of shared keys. That is, multicast groups use digital signatures to identify a specific secret-sharing rule, so that nodes in the same group can determine their session keys independently. After the initiation phase to establish group memberships and exchange shared key(s), communicating nodes fragment and shuffle messages into unicast or multicast packets to be transported along different paths. We propose two different transport layer primitives for packet delivery. In the breadth-first approach, packets arrying [sic] scattered message pieces are relayed in two stages across group members. For the depth-first approach, group members are configured into multiple rings, each of which is responsible for delivery of one packet to the destination. In both cases, only nodes that have proper keys can decode them. To resist traffic profiling attacks, all nodes keep the inbound and outbound traffic volumes identical via mixed transport of real and decoy packets. Further protection can be added by making the group identifiers secret. | en |
dc.format.medium | electronic | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | en_US | |
dc.publisher | Texas A&M University | |
dc.rights | This thesis was part of a retrospective digitization project authorized by the Texas A&M University Libraries in 2008. Copyright remains vested with the author(s). It is the user's responsibility to secure permission from the copyright holder(s) for re-use of the work beyond the provision of Fair Use. | en |
dc.subject | computer science. | en |
dc.subject | Major computer science. | en |
dc.title | Anti-eavesdropping communication layer to protect against traffic analysis | en |
dc.type | Thesis | en |
thesis.degree.discipline | computer science | en |
thesis.degree.name | M.S. | en |
thesis.degree.level | Masters | en |
dc.type.genre | thesis | en |
dc.type.material | text | en |
dc.format.digitalOrigin | reformatted digital | en |