A deeper look at Ariadne: a privacy-preserving network layer protocol

被引:0
|
作者
Fressancourt, Antoine [1 ]
Iannone, Luigi [1 ]
Kerichard, Mael [2 ]
机构
[1] Huawei Technol, Datacom Labs 2012, Paris, France
[2] ESIR, Rennes, France
关键词
Privacy; Privacy-enhancing technology; Onion routing;
D O I
10.1007/s12243-024-01017-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We present a deeper analysis of Ariadne, a privacy-preserving network layer communication protocol that we introduced in Fressancourt and Iannone (2023). Ariadne uses a source routing approach to avoid relying on trusted third parties. In Ariadne, a source node willing to send anonymized network traffic to a destination uses a path consisting in nodes with which it has pre-shared symmetric keys. Temporary keys derived from those pre-shared keys are used to protect the communication's privacy using onion routing techniques, ensuring session unlinkability for packets following the same path. Ariadne enhances previous approaches to preserve communication privacy by introducing two novelties. First, the source route is encoded in a fixed size, sequentially encrypted vector of routing information elements, in which the elements' positions in the vector are pseudo-randomly permuted. Second, the temporary keys used to process the packets on the path are referenced using mutually known encrypted patterns. This avoids the use of an explicit key reference that could be used to de-anonymize the communications. This article enriches our previous presentation of Ariadne Fressancourt and Iannone (2023) with a set of formal proofs of its security properties. Besides, a performance evaluation of Ariadne's Rust implementation is presented to assess the ability of our protocol to protect privacy at the network layer in real-world use cases.
引用
收藏
页码:745 / 762
页数:18
相关论文
共 50 条
  • [1] Privacy-preserving registration protocol for mobile network
    Liu, He
    Liang, Mangui
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1653 - 1671
  • [2] Cryptanalysis of a Privacy-Preserving Aggregation Protocol
    Datta, Amit
    Joye, Marc
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 693 - 694
  • [3] A Privacy-Preserving Protocol for Network-Neutral Caching in ISP Networks
    Andreoletti, Davide
    Ayoub, Omran
    Rottondi, Cristina
    Giordano, Silvia
    Verticale, Giacomo
    Tornatore, Massimo
    IEEE ACCESS, 2019, 7 : 160227 - 160240
  • [4] Privacy-preserving indexing of documents on the network
    Mayank Bawa
    Roberto J. Bayardo
    Rakesh Agrawal
    Jaideep Vaidya
    The VLDB Journal, 2009, 18 : 837 - 856
  • [5] Privacy-preserving indexing of documents on the network
    Bawa, Mayank
    Bayardo, Roberto J., Jr.
    Agrawal, Rakesh
    Vaidya, Jaideep
    VLDB JOURNAL, 2009, 18 (04) : 837 - 856
  • [6] Privacy-Preserving Protocol for Data Stored in the Cloud
    Hongyi Su Geng Yang Dawei Li (College of Computer Science
    ZTE Communications, 2011, 9 (02) : 36 - 38
  • [7] A Lightweight Privacy-Preserving Authentication Protocol for VANETs
    Li, Xiong
    Liu, Tian
    Obaidat, Mohammad S.
    Wu, Fan
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3547 - 3557
  • [8] Another Look at Privacy-Preserving Automated Contact Tracing
    Tang, Qiang
    ACM TRANSACTIONS ON SPATIAL ALGORITHMS AND SYSTEMS, 2022, 8 (02)
  • [9] An open privacy-preserving and scalable protocol for a Network-Neutrality compliant caching
    Andreoletti, Davide
    Rottondi, Cristina
    Giordano, Silvia
    Verticale, Giacomo
    Tornatore, Massimo
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [10] Privacy-Preserving User Recruitment Protocol for Mobile Crowdsensing
    Xiao, Mingjun
    Gao, Guoju
    Wu, Jie
    Zhang, Sheng
    Huang, Liusheng
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (02) : 519 - 532