A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

被引:2
|
作者
Chao, Daichong [1 ]
Xu, Dawei [1 ,2 ]
Gao, Feng [3 ]
Zhang, Chuan [3 ]
Zhang, Weiting [4 ]
Zhu, Liehuang [3 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Changchun Univ, Coll Cybersecur, Changchun 130022, Peoples R China
[3] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[4] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2024年 / 26卷 / 03期
关键词
Security; Peer-to-peer computing; Internet; Routing; Surveys; Tutorials; Privacy; Anonymity network; attack; vulnerability; defense; formal security; TRAFFIC ANALYSIS; TOR; AUTHENTICATION; ALGORITHMS;
D O I
10.1109/COMST.2024.3350006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of safeguarding individuals' privacy rights in online activities is unmistakable in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous anonymity networks with different objectives and design principles have emerged, providing a diverse range of applications for privacy-conscious users. However, security issues in anonymity networks have persistently existed and continue to impact their survival and development. Each anonymity network presents distinct security challenges, making it more challenging for researchers to achieve a comprehensive and systematic understanding of their security. The current literature exhibits some unavoidable gaps, including the lack of vulnerability perspectives, a unified understanding of diverse attack types, defense perspectives, and theoretical perspectives. To address these gaps, we investigate prevailing attacks targeting anonymity networks from the viewpoint of network designers and operators. We use Tor, I2P, and Freenet (arguably the three most popular anonymity networks) as case studies. Starting with these attacks, we conduct an in-depth analysis of the vulnerabilities underlying them and explore related defense mechanisms and formal security. Specifically, we classify vulnerabilities into external and internal categories, utilizing the protocol stack of an anonymity network to guide the categorization of internal vulnerabilities. Furthermore, we examine their root causes. In addition to these aspects, we emphasize the importance of formal security in researching the security of anonymity networks by integrating the investigated vulnerabilities, attacks, and defenses. Through this comprehensive, thorough, and unified approach, this paper aims to provide insights into the security of anonymity networks and offer general research findings. Finally, we discuss ongoing challenges and future directions in this specific area.
引用
收藏
页码:1775 / 1829
页数:55
相关论文
共 50 条
  • [1] A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses
    Chen, Huashan
    Pendleton, Marcus
    Njilla, Laurent
    Xu, Shouhuai
    ACM COMPUTING SURVEYS, 2020, 53 (03)
  • [2] Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses
    Abu Elkhail, Abdulrahman
    Refat, Rafi Ud Daula
    Habre, Ricardo
    Hafeez, Azeem
    Bacha, Anys
    Malik, Hafiz
    IEEE ACCESS, 2021, 9 : 162401 - 162437
  • [3] A survey on blockchain systems: Attacks, defenses, and privacy preservation
    Chen, Yourong
    Chen, Hao
    Zhang, Yang
    Han, Meng
    Siddula, Madhuri
    Cai, Zhipeng
    HIGH-CONFIDENCE COMPUTING, 2022, 2 (02):
  • [4] Security in wireless sensor networks: a survey of attacks and countermeasures
    Martins, David
    Guyennet, Herve
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2011, 1 (1-3) : 151 - 162
  • [5] A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures
    Wang, Xiaojie
    Zhao, Zhonghui
    Yi, Ling
    Ning, Zhaolong
    Guo, Lei
    Yu, F. richard
    Guo, Song
    ACM COMPUTING SURVEYS, 2025, 57 (03)
  • [6] Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision
    Shokry, Mostafa
    Awad, Ali Ismail
    Abd-Ellah, Mahmoud Khaled
    Khalaf, Ashraf A. M.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 136 : 358 - 377
  • [7] Security and Integrity Attacks in Named Data Networking: A Survey
    Shah, Mohammad Shahrul Mohd
    Leau, Yu-Beng
    Anbar, Mohammed
    Bin-Salem, Ali Abdulqader
    IEEE ACCESS, 2023, 11 : 7984 - 8004
  • [8] A Survey of Attacks and Defenses for Deep Neural Networks
    Machooka, Daniel
    Yuan, Xiaohong
    Esterline, Albert
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 254 - 261
  • [9] The state of affairs in BGP security: A survey of attacks and defenses
    Mitseva, Asya
    Panchenko, Andriy
    Engel, Thomas
    COMPUTER COMMUNICATIONS, 2018, 124 : 45 - 60
  • [10] A SURVEY OF SECURITY IN ROBOTIC SYSTEMS: VULNERABILITIES, ATTACKS, AND SOLUTIONS
    Archibald, Christopher
    Schwalm, Luke
    Ball, John E.
    INTERNATIONAL JOURNAL OF ROBOTICS & AUTOMATION, 2017, 32 (02) : 151 - 157