A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

被引:2
|
作者
Chao, Daichong [1 ]
Xu, Dawei [1 ,2 ]
Gao, Feng [3 ]
Zhang, Chuan [3 ]
Zhang, Weiting [4 ]
Zhu, Liehuang [3 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Changchun Univ, Coll Cybersecur, Changchun 130022, Peoples R China
[3] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[4] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2024年 / 26卷 / 03期
关键词
Security; Peer-to-peer computing; Internet; Routing; Surveys; Tutorials; Privacy; Anonymity network; attack; vulnerability; defense; formal security; TRAFFIC ANALYSIS; TOR; AUTHENTICATION; ALGORITHMS;
D O I
10.1109/COMST.2024.3350006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of safeguarding individuals' privacy rights in online activities is unmistakable in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous anonymity networks with different objectives and design principles have emerged, providing a diverse range of applications for privacy-conscious users. However, security issues in anonymity networks have persistently existed and continue to impact their survival and development. Each anonymity network presents distinct security challenges, making it more challenging for researchers to achieve a comprehensive and systematic understanding of their security. The current literature exhibits some unavoidable gaps, including the lack of vulnerability perspectives, a unified understanding of diverse attack types, defense perspectives, and theoretical perspectives. To address these gaps, we investigate prevailing attacks targeting anonymity networks from the viewpoint of network designers and operators. We use Tor, I2P, and Freenet (arguably the three most popular anonymity networks) as case studies. Starting with these attacks, we conduct an in-depth analysis of the vulnerabilities underlying them and explore related defense mechanisms and formal security. Specifically, we classify vulnerabilities into external and internal categories, utilizing the protocol stack of an anonymity network to guide the categorization of internal vulnerabilities. Furthermore, we examine their root causes. In addition to these aspects, we emphasize the importance of formal security in researching the security of anonymity networks by integrating the investigated vulnerabilities, attacks, and defenses. Through this comprehensive, thorough, and unified approach, this paper aims to provide insights into the security of anonymity networks and offer general research findings. Finally, we discuss ongoing challenges and future directions in this specific area.
引用
收藏
页码:1775 / 1829
页数:55
相关论文
共 50 条
  • [31] Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices-A Review
    Yaqoob, Tehreem
    Abbas, Haider
    Atiquzzaman, Mohammed
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04): : 3723 - 3768
  • [32] Vulnerabilities, Attack Effect and Different Security Scheme in WSN: A Survey
    Patle, Amit
    Gupta, Neetesh
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [33] Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments
    Palama, Ivan
    Amici, Alessandro
    Bellicini, Gabriele
    Gringoli, Francesco
    Pedretti, Fabio
    Bianchi, Giuseppe
    COMPUTER COMMUNICATIONS, 2023, 212 : 129 - 140
  • [34] A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges
    Tahirkheli, Abeer Iftikhar
    Shiraz, Muhammad
    Hayat, Bashir
    Idrees, Muhammad
    Sajid, Ahthasham
    Ullah, Rahat
    Ayub, Nasir
    Kim, Ki-Il
    ELECTRONICS, 2021, 10 (15)
  • [35] A Survey of Moving Target Defenses for Network Security
    Sengupta, Sailik
    Chowdhary, Ankur
    Sabur, Abdulhakim
    Alshamrani, Adel
    Huang, Dijiang
    Kambhampati, Subbarao
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1909 - 1941
  • [36] Defenses to Membership Inference Attacks: A Survey
    Hu, Li
    Yan, Anli
    Yan, Hongyang
    Li, Jin
    Huang, Teng
    Zhang, Yingying
    Dong, Changyu
    Yang, Chunsheng
    ACM COMPUTING SURVEYS, 2024, 56 (04)
  • [37] A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead
    Pedreira, Vitor
    Barros, Daniel
    Pinto, Pedro
    SENSORS, 2021, 21 (15)
  • [38] A Survey on Addressing IoT Security Issues by Embedding Blockchain Technology Solutions: Review, Attacks, Current Trends, and Applications
    Huan, Nathalie Tan Yhe
    Zukarnain, Zuriati Ahmad
    IEEE ACCESS, 2024, 12 : 69765 - 69782
  • [39] IoT Security: A Layered Approach for Attacks & Defenses
    Ahemd, Mian Muhammad
    Shah, Munam Ali
    Wahid, Abdul
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 104 - 110
  • [40] A Systematic Review of Cyber Security and Classification of Attacks in Networks
    Kashif, Muhammad
    Malik, Sheraz Arshad
    Abdullah, Muhammad Tahir
    Umair, Muhammad
    Khan, Prince Waqas
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (06) : 201 - 207