You are here: Resources > FIDIS Deliverables > HighTechID > D3.3: Study on Mobile Identity Management > 

D3.3: Study on Mobile Identity Management

Requirements for Anonymous Communication Mechanisms  Study on Mobile Identity Management
COMPARISON OF ANONYMOUS COMMUNICATION MECHANISMS
 Conclusions

 

Comparison of Anonymous Communication Mechanisms

Therefore, we can summarise the comparison of the anonymity mechanisms applied in ad hoc networks in the following table. The table contents correspond to a brief summary of the analysis of the mechanisms.

 

Crowds 

Tarzan 

MorphMix 

Hordes 

Performance 

DH between Crowds nodes -in the newest Crowds version 

( L )2 messages needed, dummy traffic and ( L ) public key operations

6*L+2*∑(i-1) messages,(4*L) public key operations and ( L ) DH

DH between Hordes nodes 

Scalability 

Depends on the blender (server) may scale well 

May not scale well in large and dynamic networks 

Not exactly clear 

Different paths from forward and reverse traffic increases scalability 

Security 

Depends on the probability (pf) of forwarding messages

Initiator sets the anonymous tunnel path 

Collusion detection mechanism 

Depends on the number of nodes in each multicast group 

Robustness 

Tunnel path is rebuild from the broken link 

The broken part of the tunnel path is rebuild 

The whole tunnel shall be rebuild 

Forward path is Crowd similar. reverse path is multicast based 

Independent of a deployed infrastructure 

No, blender is a directory server 

Yes 

Apparently yes, but not exactly clear 

Membership is controlled by a central server 

 

Requirements for Anonymous Communication Mechanisms  fidis-wp3-del3.3.study_on_mobile_identity_management.final_04.sxw  Conclusions
27 / 36