Affiliation:
1. Digital Society Institute , ESMT Berlin
Abstract
Abstract
The Internet infrastructure has not been built with security or privacy in mind. As a result, an adversary who has control over a single Autonomous System can set-up mass surveillance systems to gather meta data by passively collecting the headers of the messages they route. To solve this problem, lightweight anonymous routing protocols such as LAP, DOVETAIL and most recently PHI have been proposed which are efficient enough to be deployed in a large scale infrastructure such as the Internet. In this paper we take a closer look at PHI and introduce several de-anonymization attacks malicious nodes can perform to reduce the sender and receiver anonymity. As a direct consequence of this analysis we propose a new protocol called dependable PHI (dPHI). The security analysis of dPHI includes a detailed quantitative anonymity analysis that compares dPHI with PHI, LAP and HORNET. Together with the performance analysis, this allows for a good comparison of trade-offs for these anonymity protocols.
Reference32 articles.
1. [1] M. AlSabah and I. Goldberg, “Performance and security improvements for tor: A survey,” ACM Computing Surveys (CSUR), vol. 49, no. 2, p. 32, 2016.
2. [2] N. Anderson, “How china swallowed 15% of net traffic for 18 minutes,” 11 2010, Arstechnica. [Online]. Available: https://arstechnica.com/information-technology/2010/11/how-china-swallowed-15-of-net-traffic-for-18-minutes/
3. [3] G. Asharov, D. Demmler, M. Schapira, T. Schneider, G. Segev, S. Shenker, and M. Zohner, “Privacy-preserving interdomain routing at internet scale,” Proceedings on Privacy Enhancing Technologies, vol. 2017, no. 3, pp. 147–167, 2017.
4. [4] A. Bajic and G. T. Becker, “Github repository of used software and data,” https://github.com/AlexB030/dPHI, [Online; uploaded 10-March-2020].
5. [5] N. Borisov, G. Danezis, P. Mittal, and P. Tabriz, “Denial of service or denial of security?” in Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 92–102.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献