SmartMeasurer: A Secure and Automated Bandwidth Measurement for Tor with Smart Contract
-
Published:2023-09-28
Issue:19
Volume:11
Page:4105
-
ISSN:2227-7390
-
Container-title:Mathematics
-
language:en
-
Short-container-title:Mathematics
Author:
Tang Zejia1, Pan Tianyao2, Han Yang1, Shen Tongzhou1, Xu Lei1, Xu Dawei13ORCID
Affiliation:
1. School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China 2. School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China 3. College of Cybersecurity, Changchun University, Changchun 130022, China
Abstract
Tor is now using a centralized measurement system called Sbws to measure the bandwidth of relays to guide clients in selecting relays to balance traffic. Sbws has been proven to be vulnerable to multiple attacks because of the centralized structure and exposed measurements. We present SmartMeasurer, a secure and decentralized system for bandwidth measurement. Combining smart contract, Oracle Chainlink and ECC technology, we achieve decentralization while hiding the measurement circuits among the general circuits by exploiting the dual identity of randomly dynamic measurers and guards. We analyze the security of our system and demonstrate that it defends against three types of attacks. Our experiments on both private and public Tor networks show that our system is decentralized while keeping the error and the average of our measurements converges to a small interval of 0.30 Mbps. Compared to other existing methods, our system reduces trust assumptions and the costs of using smart contract, and enhances the practical feasibility of the solution.
Funder
National Key Research and Development Program of China National Natural Science Foundation of China
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference38 articles.
1. (2020, May 05). Tor Metrics. Available online: https://metrics.torproject.org/. 2. Andre, G., Alexandra, D., and Samuel, K. (2018, January 3–7). Smartor: Smarter tor with smart contracts: Improving resilience of topology distribution in the tor network. Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, PR, USA. 3. Jansen, R., Vaidya, T., and Sherr, M. (2019, January 14–16). Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor. Proceedings of the USENIX Security Symposium, Santa Clara, CA, USA. 4. Wacek, C., Tan, H., Bauer, K.S., and Sherr, M. (2013, January 25–27). An Empirical Evaluation of Relay Selection in Tor. Proceedings of the NDSS, San Diego, CA, USA. 5. Biryukov, A., Pustogarov, I., and Weinmann, R.P. (2013, January 19–22). Trawling for tor hidden services: Detection, measurement, deanonymization. Proceedings of the 2013 IEEE Symposium on Security and Privacy, San Francisco, CA, USA.
|
|