A design of overlay anonymous multicast protocol

  • Authors:
  • Li Xiao;Xiaomei Liu;Wenjun Gu;Dong Xuan;Yunhao Liu

  • Affiliations:
  • Dept. of Computer Science and Engineering, Michigan State University, East Lansing, MI;Dept. of Computer Science and Engineering, Michigan State University, East Lansing, MI;Dept. of Computer Science and Engineering, Ohio State University, Columbus, OH;Dept. of Computer Science and Engineering, Ohio State University, Columbus, OH;Dept. of Computer Science, Hong Kong Univ. of Science and Technology, Kowloon, Hong Kong

  • Venue:
  • IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
  • Year:
  • 2006

Quantified Score

Hi-index 0.01

Visualization

Abstract

Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous multicasting and such services are not available yet. Since there are fundamental differences between multicast and unicast, the solutions proposed for anonymity in unicast communications cannot be directly applied to multicast applications. In this paper we define the anonymous multicast system, and propose a mutual anonymous multicast (MAM) protocol including the design of a unicast mutual anonymity protocol and construction and optimization of an anonymous multicast tree. MAM is self organizing and completely distributed. We define the attack model in an anonymous multicast system and analyze the anonymity degree. We also evaluate the performance of MAM by simulations.