A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

被引:2
|
作者
Chao, Daichong [1 ]
Xu, Dawei [1 ,2 ]
Gao, Feng [3 ]
Zhang, Chuan [3 ]
Zhang, Weiting [4 ]
Zhu, Liehuang [3 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Changchun Univ, Coll Cybersecur, Changchun 130022, Peoples R China
[3] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[4] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2024年 / 26卷 / 03期
关键词
Security; Peer-to-peer computing; Internet; Routing; Surveys; Tutorials; Privacy; Anonymity network; attack; vulnerability; defense; formal security; TRAFFIC ANALYSIS; TOR; AUTHENTICATION; ALGORITHMS;
D O I
10.1109/COMST.2024.3350006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of safeguarding individuals' privacy rights in online activities is unmistakable in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous anonymity networks with different objectives and design principles have emerged, providing a diverse range of applications for privacy-conscious users. However, security issues in anonymity networks have persistently existed and continue to impact their survival and development. Each anonymity network presents distinct security challenges, making it more challenging for researchers to achieve a comprehensive and systematic understanding of their security. The current literature exhibits some unavoidable gaps, including the lack of vulnerability perspectives, a unified understanding of diverse attack types, defense perspectives, and theoretical perspectives. To address these gaps, we investigate prevailing attacks targeting anonymity networks from the viewpoint of network designers and operators. We use Tor, I2P, and Freenet (arguably the three most popular anonymity networks) as case studies. Starting with these attacks, we conduct an in-depth analysis of the vulnerabilities underlying them and explore related defense mechanisms and formal security. Specifically, we classify vulnerabilities into external and internal categories, utilizing the protocol stack of an anonymity network to guide the categorization of internal vulnerabilities. Furthermore, we examine their root causes. In addition to these aspects, we emphasize the importance of formal security in researching the security of anonymity networks by integrating the investigated vulnerabilities, attacks, and defenses. Through this comprehensive, thorough, and unified approach, this paper aims to provide insights into the security of anonymity networks and offer general research findings. Finally, we discuss ongoing challenges and future directions in this specific area.
引用
收藏
页码:1775 / 1829
页数:55
相关论文
共 50 条
  • [41] Federated learning vulnerabilities, threats and defenses: A systematic review and future directions
    Almutairi, Suzan
    Barnawi, Ahmed
    INTERNET OF THINGS, 2023, 24
  • [42] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [43] A survey on security attacks in VANETs: Communication, applications and challenges
    Arif, Muhammad
    Wang, Guojun
    Bhuiyan, Md Zakirul Alam
    Wang, Tian
    Chen, Jianer
    VEHICULAR COMMUNICATIONS, 2019, 19
  • [44] Virtualized Network Functions Security Attacks and Vulnerabilities
    Aljuhani, Ahamed
    Alharbi, Talal
    2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [45] A survey on security and privacy issues in Wireless Mesh Networks
    Sgora, Aggeliki
    Vergados, Dimitrios D.
    Chatzimisios, P.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1877 - 1889
  • [46] Deep learning model inversion attacks and defenses: a comprehensive survey
    Wencheng Yang
    Song Wang
    Di Wu
    Taotao Cai
    Yanming Zhu
    Shicheng Wei
    Yiying Zhang
    Xu Yang
    Zhaohui Tang
    Yan Li
    Artificial Intelligence Review, 58 (8)
  • [47] Security Risk and Attacks in AI: A Survey of Security and Privacy
    Rahman, Md Mostafizur
    Arshi, Aiasha Siddika
    Hasan, Md Mehedi
    Mishu, Sumayia Farzana
    Shahriar, Hossain
    Wu, Fan
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 1834 - 1839
  • [48] Anonymity and security improvements in heterogeneous connected vehicle networks
    Sivasankari, S. A.
    Gupta, Deepak
    Keshta, Ismail
    Reddy, Ch. Venkata Krishna
    Singh, Pavitar Parkash
    Byeon, Haewon
    INTERNATIONAL JOURNAL OF DATA SCIENCE AND ANALYTICS, 2024, 19 (4) : 749 - 762
  • [49] Attacks and defenses in user authentication systems: A survey
    Wang, Xuerui
    Yan, Zheng
    Zhang, Rui
    Zhang, Peng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 188
  • [50] POSTER: Traffic Analysis Attacks in Anonymity Networks
    Kohis, Katharina
    Popper, Christina
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 917 - 919