A deeper look at Ariadne: a privacy-preserving network layer protocol

被引:0
作者
Fressancourt, Antoine [1 ]
Iannone, Luigi [1 ]
Kerichard, Mael [2 ]
机构
[1] Huawei Technol, Datacom Labs 2012, Paris, France
[2] ESIR, Rennes, France
关键词
Privacy; Privacy-enhancing technology; Onion routing;
D O I
10.1007/s12243-024-01017-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We present a deeper analysis of Ariadne, a privacy-preserving network layer communication protocol that we introduced in Fressancourt and Iannone (2023). Ariadne uses a source routing approach to avoid relying on trusted third parties. In Ariadne, a source node willing to send anonymized network traffic to a destination uses a path consisting in nodes with which it has pre-shared symmetric keys. Temporary keys derived from those pre-shared keys are used to protect the communication's privacy using onion routing techniques, ensuring session unlinkability for packets following the same path. Ariadne enhances previous approaches to preserve communication privacy by introducing two novelties. First, the source route is encoded in a fixed size, sequentially encrypted vector of routing information elements, in which the elements' positions in the vector are pseudo-randomly permuted. Second, the temporary keys used to process the packets on the path are referenced using mutually known encrypted patterns. This avoids the use of an explicit key reference that could be used to de-anonymize the communications. This article enriches our previous presentation of Ariadne Fressancourt and Iannone (2023) with a set of formal proofs of its security properties. Besides, a performance evaluation of Ariadne's Rust implementation is presented to assess the ability of our protocol to protect privacy at the network layer in real-world use cases.
引用
收藏
页码:745 / 762
页数:18
相关论文
共 50 条
[21]   A Privacy-Preserving Graph Neural Network for Network Intrusion Detection [J].
Pei, Xinjun ;
Deng, Xiaoheng ;
Tian, Shengwei ;
Jiang, Ping ;
Zhao, Yunlong ;
Xue, Kaiping .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) :740-756
[22]   Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network [J].
Li, Quanrun ;
He, Debiao ;
Yang, Zhichao ;
Xie, Qi ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (04) :4336-4347
[23]   A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network [J].
Pankaj Kumar ;
Hari Om .
The Journal of Supercomputing, 2022, 78 :17657-17688
[24]   A conditional privacy-preserving and desynchronization-resistant authentication protocol for vehicular ad hoc network [J].
Kumar, Pankaj ;
Om, Hari .
JOURNAL OF SUPERCOMPUTING, 2022, 78 (16) :17657-17688
[25]   Privacy-preserving Mutual Authentication Protocol for Drone Delivery Services [J].
Parameswarath, Rohini Poolat ;
Sikdar, Biplab .
IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, :2166-2171
[26]   A Lightweight Privacy-Preserving Mutual Authentication Protocol for RFID Systems [J].
Fan, Xinxin ;
Gong, Guang ;
Engels, Daniel W. ;
Smith, Eric M. .
2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, :1083-1087
[27]   A new privacy-preserving authentication protocol for anonymous web browsing [J].
Yang, Xu ;
Yi, Xun ;
Khalil, Ibrahim ;
Cui, Hui ;
Yang, Xuechao ;
Nepal, Surya ;
Huang, Xinyi ;
Zeng, Yali .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21)
[28]   Privacy-Preserving Image Classification Using an Isotropic Network [J].
AprilPyone, MaungMaung ;
Kiya, Hitoshi .
IEEE MULTIMEDIA, 2022, 29 (02) :23-33
[29]   Efficient Privacy-Preserving Machine Learning for Blockchain Network [J].
Kim, Hyunil ;
Kim, Seung-Hyun ;
Hwang, Jung Yeon ;
Seo, Changho .
IEEE ACCESS, 2019, 7 :136481-136495
[30]   Privacy-Preserving Average Consensus Through Network Augmentation [J].
Ramos, Guilherme ;
Aguiar, Antonio Pedro ;
Kar, Soummya ;
Pequito, Sergio .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (10) :6907-6919