WIP: An Onion-Based Routing Protocol Strengthening Anonymity

被引:6
作者
Buccafurri, Francesco [1 ]
De Angelis, Vincenzo [1 ]
Idone, Maria Francesca [1 ]
Labrini, Cecilia [1 ]
机构
[1] Univ Reggio Calabria, DIIES Dept, Reggio Di Calabria, Italy
来源
2021 IEEE 22ND INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2021) | 2021年
关键词
Anonymous Communication Networks; Privacy; Onion; Anonymity; Global Adversary Model;
D O I
10.1109/WoWMoM51794.2021.00041
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Anonymous Communication Networks (ACNs) are networks in which, beyond data confidentiality, also traffic flow confidentiality is provided. The most popular routing approach for ACNs also used in practice is Onion. Onion is based on multiple encryption wrapping combined with the proxy mechanism (relay nodes). However, it offers neither sender anonymity nor recipient anonymity in a global passive adversary model, simply because the adversary can observe (at the first relay node) the traffic coming from the sender, and (at the last relay node) the traffic delivered to the recipient. This may also cause a loss of relationship anonymity if timing attacks are performed. This paper presents Onion-Ring, a routing protocol that improves anonymity of Onion in the global adversary model, by achieving sender anonymity and recipient anonymity, and thus relationship anonymity.
引用
收藏
页码:231 / 235
页数:5
相关论文
共 19 条
[1]   Buses for anonymous message delivery [J].
Beimel, A ;
Dolev, S .
JOURNAL OF CRYPTOLOGY, 2003, 16 (01) :25-39
[2]  
Burnside M, 2006, LECT NOTES COMPUT SC, V4176, P32
[3]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88
[4]   TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer [J].
Chen, Chen ;
Asoni, Daniele E. ;
Perrig, Adrian ;
Barrera, David ;
Danezis, George ;
Troncoso, Carmela .
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, :137-152
[5]   HORNET: High-speed Onion Routing at the Network Layer [J].
Chen, Chen ;
Asoni, Daniele E. ;
Barrera, David ;
Danezis, George ;
Perrig, Adrian .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1441-1454
[6]   Sphinx: A Compact and Provably Secure Mix Format [J].
Danezis, George ;
Goldberg, Ian .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :269-+
[7]  
Feigenbaum J., 2012, PROC 2012 WORKSHOP P
[8]   Probabilistic Analysis of Onion Routing in a Black-Box Model [J].
Feigenbaum, Joan ;
Johnson, Aaron ;
Syverson, Paul .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (03)
[9]  
Goldschlag D. M., 1996, Information Hiding. First International Workshop Proceedings, P137
[10]  
Hirt A, 2008, I S MOD ANAL SIM COM, P141