##plugins.themes.academic_pro.article.main##

Abstract

As we studied in our literature, the recent method was presented for blocking of misbehaving user in the Tor networks  called as Nymble. However the first limitation which we identified for Nymble is that if the Nymble manager fails, then whole security system is fails second limitation is blocking IP address is not feasible because if we reconnect it we get new IP address by dynamic property IP addressing.Drawback of existing  system can be overcome by our proposed system i.e “Detection and Prevention of misbehaving users in anonymzing networkâ€. MAC address is used for blocking misbehaving users in anonymizing network. which cover MAC  address as user identity, as IP address can be dynamically generated,it is not useful to solve above problem As ,we use MAC address, there is no chance for Sybil attack, as MAC address is physical address it cannot be change at any cost.As existing system is totally centralized to nymble manager, to overcome above all drawback, we use reliable system where second manager  may handle task of first nymble manager failure.current system has scalability property as well as it  can handle multiple server requestsat a time  .We use strongly cryptography algorithm it’s hard to break security of our system.

Key Words:- Anonymizing, blacklisting, Sybil attack, MAC addresss

##plugins.themes.academic_pro.article.details##

Author Biographies

Mrs. Anuse A.A, SKN, Vadgaon (Bk), Pune. University of Pune

Department of Computer Engg

Mrs. Rachana A. Satao, SKN, Vadgaon (Bk), Pune University of Pune

Assistant Professor, Department of Computer Engg,
How to Cite
A.A, M. A., & Satao, M. R. A. (2014). Analyzing and Blocking Misbehaving User in Anonymizing Network. International Journal of Emerging Trends in Science and Technology, 1(05). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/236

References

[1] Giuseppe Ateniese and Breno de Medeiros. Efficient group signatures without trapdoors.In Chi-Sung Laih, editor, Advances in Cryptology — ASIACRYPT 2003, volume 2894 ofLecture Notes in Computer Science, pages 246–268. Springer Verlag, 2003.
[2] Giuseppe Ateniese, Jan Camenisch, Marc Joye, and Gene Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Mihir Bellare, editor, Advances in Cryptology — CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255–270. Springer Verlag, 2000.
[3] D.Chaum and E.van Heyst, “Group Signatures,” Proc.Int’l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT) pp.237-265, 1991.
[4] S. Brands, “Restrictive Blinding of Secret-Key Certificates,”in Proceedings of EUROCRYPT 1995, Saint-Malo, France,May 1995.
[5] Boukerche, A.; El-Khatib, K.; Li Xu; Korba, L., SDAR: “A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks”, IEEE Comput. Soc. 29 -2004.
[6] Ray Dillinger, Cyclopedia Cryptologia-an online encyclopedia of cryptographic protocols. http://www.disappearing-inc.com.