A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

被引:2
|
作者
Chao, Daichong [1 ]
Xu, Dawei [1 ,2 ]
Gao, Feng [3 ]
Zhang, Chuan [3 ]
Zhang, Weiting [4 ]
Zhu, Liehuang [3 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Changchun Univ, Coll Cybersecur, Changchun 130022, Peoples R China
[3] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[4] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2024年 / 26卷 / 03期
关键词
Security; Peer-to-peer computing; Internet; Routing; Surveys; Tutorials; Privacy; Anonymity network; attack; vulnerability; defense; formal security; TRAFFIC ANALYSIS; TOR; AUTHENTICATION; ALGORITHMS;
D O I
10.1109/COMST.2024.3350006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of safeguarding individuals' privacy rights in online activities is unmistakable in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous anonymity networks with different objectives and design principles have emerged, providing a diverse range of applications for privacy-conscious users. However, security issues in anonymity networks have persistently existed and continue to impact their survival and development. Each anonymity network presents distinct security challenges, making it more challenging for researchers to achieve a comprehensive and systematic understanding of their security. The current literature exhibits some unavoidable gaps, including the lack of vulnerability perspectives, a unified understanding of diverse attack types, defense perspectives, and theoretical perspectives. To address these gaps, we investigate prevailing attacks targeting anonymity networks from the viewpoint of network designers and operators. We use Tor, I2P, and Freenet (arguably the three most popular anonymity networks) as case studies. Starting with these attacks, we conduct an in-depth analysis of the vulnerabilities underlying them and explore related defense mechanisms and formal security. Specifically, we classify vulnerabilities into external and internal categories, utilizing the protocol stack of an anonymity network to guide the categorization of internal vulnerabilities. Furthermore, we examine their root causes. In addition to these aspects, we emphasize the importance of formal security in researching the security of anonymity networks by integrating the investigated vulnerabilities, attacks, and defenses. Through this comprehensive, thorough, and unified approach, this paper aims to provide insights into the security of anonymity networks and offer general research findings. Finally, we discuss ongoing challenges and future directions in this specific area.
引用
收藏
页码:1775 / 1829
页数:55
相关论文
共 50 条
  • [21] A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
    Obaidat, Muath A.
    Obeidat, Suhaib
    Holst, Jennifer
    Al Hayajneh, Abdullah
    Brown, Joseph
    COMPUTERS, 2020, 9 (02)
  • [22] Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses
    Ferrag, Mohamed Amine
    Friha, Othmane
    Kantarci, Burak
    Tihanyi, Norbert
    Cordeiro, Lucas
    Debbah, Merouane
    Hamouda, Djallel
    Al-Hawawreh, Muna
    Choo, Kim-Kwang Raymond
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (04): : 2654 - 2713
  • [23] Optimus: A Framework of Vulnerabilities, Attacks, Defenses and SLA Ontologies
    Lee, Chen-Yu
    Kamongi, Patrick
    Kavi, Krishna M.
    Gomathisankaran, Mahadevan
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2015, 6 (01): : 42 - 56
  • [24] Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
    Muhammad, Zia
    Anwar, Zahid
    Javed, Abdul Rehman
    Saleem, Bilal
    Abbas, Sidra
    Gadekallu, Thippa Reddy
    TECHNOLOGIES, 2023, 11 (03)
  • [25] Survey on Security Attacks in Vehicular Ad hoc Networks (VANETs)
    Al-kahtani, Mohammed Saeed
    6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS'2012), 2012,
  • [26] The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses
    Homoliak, Ivan
    Venugopalan, Sarad
    Reijsbergen, Daniel
    Hum, Qingze
    Schumi, Richard
    Szalachowski, Pawel
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (01): : 341 - 390
  • [27] Survey of Security Protocols and Vulnerabilities in Unmanned Aerial Vehicles
    Shafique, Arslan
    Mehmood, Abid
    Elhadef, Mourad
    IEEE ACCESS, 2021, 9 : 46927 - 46948
  • [28] Security Attacks in Wireless Sensor Networks: A Survey
    Patel, Manish M.
    Aggarwal, Akshai
    2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP), 2013, : 329 - 333
  • [29] A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures
    Farhadi, Mozhdeh
    Lanet, Jean-Louis
    Pierre, Guillaume
    Miorandi, Daniele
    SOFTWARE-PRACTICE & EXPERIENCE, 2020, 50 (06) : 973 - 997
  • [30] A Survey on Voice Assistant Security: Attacks and Countermeasures
    Yan, Chen
    Ji, Xiaoyu
    Wang, Kai
    Jiang, Qinhong
    Jin, Zizhi
    Xu, Wenyuan
    ACM COMPUTING SURVEYS, 2023, 55 (04)