An Anonymous Overlay Routing Protocol for Uplink-Intensive Applications

by   Francesco Buccafurri, et al.

Sender anonymity in network communication is an important problem, widely addressed in the literature. Mixnets, combined with onion routing, represent certainly the most concrete and effective approach achieving the above goal. In general, the drawback of these approaches is that anonymity has a price in terms of traffic overhead and latency. On the Internet, to achieve scalability and not to require relevant infrastructure and network-protocol changes, only P2P overlay protocols can be adopted. Among these, the most representative proposal is certainly Tarzan, which is designed to obtain strong anonymity still preserving low-latency applications. In recent years, we are witnessing a change in Internet traffic. Due to IoT, cloud storage, WSN, M2M, uplink traffic is more and more increasing. An interesting question is whether this new traffic configuration may enable new strategies to improve the effectiveness of Tarzan-like approaches. In this paper, we investigate this problem, by proposing C-Tarzan, an anonymous overlay P2P routing protocol. Through a deep experimental analysis, we show that C-Tarzan outperforms Tarzan in the case of uplink-intensive applications.


page 1

page 2

page 3

page 4


Analysis of Uplink Scheduling for Haptic Communications

While new mechanisms and configurations of the 5G radio are offering ste...

Reliable Group Communication Protocol for Internet of Things

In this paper, we propose RECOUP, a reliable group communication routing...

Subband Random Sensing Grant Free Uplink for URLLC in Unlicensed Spectrum

In this paper, we propose a novel scheme called subband random sensing (...

Fast Traffic Engineering by Gradient Descent with Learned Differentiable Routing

Emerging applications such as the metaverse, telesurgery or cloud comput...

Routing Games in the Wild: Efficiency, Equilibration and Regret (Large-Scale Field Experiments in Singapore)

Routing games are amongst the most well studied domains of game theory. ...

Routing for Intermittently-Powered Sensing Systems

Recently, intermittent computing (IC) has received tremendous attention ...

Into Summarization Techniques for IoT Data Discovery Routing

In this paper, we consider the IoT data discovery problem in very large ...

Please sign up or login with your details

Forgot password? Click here to reset