Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication Network
Abstract
:1. Introduction
2. Related Works
2.1. Source-Controlled Routing Protocols
2.2. Low-Latency Anonymous Communication Systems
3. Design
3.1. Network Model
3.2. Path Construction
Algorithm 1 Path construction algorithm |
Require: A list of group leaders fetched from Directory Server, group number g; |
Ensure: The address from the user to the website |
|
3.3. Data Forwarding
4. Performance Evaluation
4.1. Performance Metrics
4.2. Simulation Design
4.3. Results Analysis
5. Anonymity Analysis
5.1. Threat Model
5.2. Anonymity Degree
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Montieri, A.; Ciuonzo, D.; Aceto, G.; Pescapé, A. Anonymity services tor, i2p, jondonym: Classifying in the dark (web). IEEE Trans. Dependable Secur. Comput. 2018, 17, 662–675. [Google Scholar] [CrossRef]
- Chaum, D. The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptol. 1988, 1, 65–75. [Google Scholar] [CrossRef]
- Mödinger, D.; Heß, A.; Hauck, F.J. Arbitrary length K-anonymous dining-cryptographers communication. arXiv 2021, arXiv:2103.17091. [Google Scholar] [CrossRef]
- Freedman, M.J.; Sit, E.; Cates, J.; Morris, R. Tarzan: A peer-to-peer anonymizing network layer. Proc. ACM Conf. Comput. Commun. Secur. 2002, 2429, 193–206. [Google Scholar] [CrossRef]
- Rennhard, M.; Plattner, B. Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection. In Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA, 21 November 2002; pp. 91–102. [Google Scholar] [CrossRef]
- Mathieu, B.; Song, M.; Kleis, M. A p2p approach for the selection of media processing modules for service specific overlay networks. In Proceedings of the Advanced Int’l Conference on Telecommunications and Int’l Conference on Internet and Web Applications and Services (AICT-ICIW’06), Washington, DC, USA, 19–25 February 2006; p. 103. [Google Scholar] [CrossRef]
- Winter, P.; Ensafi, R.; Loesing, K.; Feamster, N. Identifying and characterizing Sybils in the Tor network. In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA, 10–12 August 2016; pp. 1169–1185. [Google Scholar] [CrossRef]
- Sankey, J.; Wright, M. Dovetail: Stronger anonymity in next-generation internet routing. In Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium, Amsterdam, The Netherlands, 16–18 July 2014; pp. 283–303. [Google Scholar] [CrossRef]
- Back, A.; Möller, U.; Stiglic, A. Traffic analysis attacks and trade-offs in anonymity providing systems. Lect. Notes Comput. Sci. (Incl. Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinform.) 2001, 2137, 245–257. [Google Scholar] [CrossRef]
- Murdoch, S.J.; Danezis, G. Low-cost traffic analysis of Tor. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P’05), Oakland, CA, USA, 8–11 May 2005; pp. 183–195. [Google Scholar] [CrossRef]
- Tusing, N.; Oakley, J.; Barrineau, G.; Yu, L.; Wang, K.C.; Brooks, R.R. Traffic analysis resistant network (tarn) anonymity analysis. In Proceedings of the 2019 IEEE 27th International Conference on Network Protocols (ICNP), Chicago, IL, USA, 8–10 October 2019; pp. 1–2. [Google Scholar] [CrossRef]
- Akhoondi, M.; Yu, C.; Madhyastha, H.V. LASTor: A low-latency AS-aware tor client. IEEE/ACM Trans. Netw. 2014, 22, 1742–1755. [Google Scholar] [CrossRef]
- Kohls, K.; Jansen, K.; Rupprecht, D.; Holz, T.; Pöpper, C. On the Challenges of Geographical Avoidance for Tor. In Proceedings of the NDSS, San Diego, CA, USA, 24–27 February 2019. [Google Scholar] [CrossRef]
- Yang, X.; Clark, D.; Berger, A.W. NIRA: A new inter-domain routing architecture. IEEE/ACM Trans. Netw. 2007, 15, 775–788. [Google Scholar] [CrossRef]
- de Farias, C.M.; Pirmez, L.; Delicato, F.C.; Pires, P.F.; Guerrieri, A.; Fortino, G.; Cauteruccio, F.; Terracina, G. A multisensor data fusion algorithm using the hidden correlations in Multiapplication Wireless Sensor data streams. In Proceedings of the 2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC), Calabria, Italy, 16–18 May 2017; pp. 96–102. [Google Scholar] [CrossRef]
- Shirazi, F.; Simeonovski, M.; Asghar, M.R.; Backes, M.; Diaz, C. A survey on routing in anonymous communication protocols. ACM Comput. Surv. (CSUR) 2018, 51, 1–39. [Google Scholar] [CrossRef]
- Zhang, X.; Hsiao, H.C.; Hasker, G.; Chan, H.; Perrig, A.; Andersen, D.G. SCION: Scalability, control, and isolation on next-generation networks. In Proceedings of the 2011 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 22–25 May 2011; pp. 212–227. [Google Scholar] [CrossRef]
- Zhao, A.; Liu, Z.; Pan, J.; Liang, M. A novel addressing and routing architecture for cloud-service datacenter networks. IEEE Trans. Serv. Comput. 2019, 15, 414–428. [Google Scholar] [CrossRef]
- Liang, M.; Zhang, J.; Wang, S. A new network based on vector address. In Proceedings of the IET 2nd International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2008), Beijing, China, 12–15 October 2008; pp. 118–122. [Google Scholar] [CrossRef]
- Chen, C.; Asoni, D.E.; Barrera, D.; Danezis, G.; Perrig, A. HORNET: High-speed onion routing at the network layer. In Proceedings of the ACM Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015; Volume 2015, pp. 1441–1454. [Google Scholar] [CrossRef]
- Hsiao, H.C.; Kim, T.H.J.; Perrig, A.; Yamada, A.; Nelson, S.C.; Gruteser, M.; Meng, W. LAP: Lightweight anonymity and privacy. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 20–23 May 2012; pp. 506–520. [Google Scholar] [CrossRef]
- Chen, C.; Asoni, D.E.; Perrig, A.; Barrera, D.; Troncoso, C. TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer. In Proceedings of the 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK, 24–26 April 2018. [Google Scholar]
- Xia, Y.; Chen, R.; Su, J.; Zou, H. Balancing anonymity and resilience in anonymous communication networks. Comput. Secur. 2021, 101, 102106. [Google Scholar] [CrossRef]
- Chaum, D.L. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 1981, 24, 84–90. [Google Scholar] [CrossRef]
- Shoup, V.; Gennaro, R. Securing threshold cryptosystems against chosen ciphertext attack. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Espoo, Finland, 31 May–4 June 1998; pp. 1–16. [Google Scholar] [CrossRef]
- Danezis, G.; Goldberg, I. Sphinx: A compact and provably secure mix format. In Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, Oakland, CA, USA, 17–20 May 2009; pp. 269–282. [Google Scholar] [CrossRef]
- Varga, A. The OMNET++ discrete event simulation system. In Proceedings of the European Simulation Multiconference, Prague, Czech Republic, 6–9 June 2001; pp. 319–324. [Google Scholar]
- Syverson, P. Onion routing for resistance to traffic analysis. In Proceedings of the DARPA Information Survivability Conference and Exposition, Washington, DC, USA, 22–24 April 2003; Volume 2, pp. 108–110. [Google Scholar] [CrossRef]
- Overlier, L.; Syverson, P. Locating hidden servers. In Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P’06), Berkeley, CA, USA, 21–24 May 2006; p. 15. [Google Scholar] [CrossRef]
- Johnson, A.; Wacek, C.; Jansen, R.; Sherr, M.; Syverson, P. Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries. In Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security, Berlin, Germany, 4–8 November 2013. [Google Scholar] [CrossRef]
- Díaz, C.; Seys, S.; Claessens, J.; Preneel, B. Towards measuring anonymity. Lect. Notes Comput. Sci. (Incl. Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinform.) 2003, 2482, 54–68. [Google Scholar] [CrossRef]
- Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
- Grube, T.; Egert, R.; Mühlhäuser, M.; Daubert, J. The Cost of Path Information: Routing in Anonymous Communication. In Proceedings of the 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2021; pp. 1–6. [Google Scholar] [CrossRef]
ACNs | Routing Type | Latency | Challenge |
---|---|---|---|
Tor | hop by hop | middle | traffic analysis |
LAP | source controlled | low | traffic analysis |
Hornet | source controlled | low | replay attack |
TARANET | source controlled | middle | increased latency |
T-Hybrid | hybrid | middle | increased latency |
Dovetail | source controlled | low | traffic analysis |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Meng, X.; Liang, M. Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication Network. Sensors 2023, 23, 8810. https://doi.org/10.3390/s23218810
Meng X, Liang M. Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication Network. Sensors. 2023; 23(21):8810. https://doi.org/10.3390/s23218810
Chicago/Turabian StyleMeng, Xiance, and Mangui Liang. 2023. "Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication Network" Sensors 23, no. 21: 8810. https://doi.org/10.3390/s23218810
APA StyleMeng, X., & Liang, M. (2023). Port-Based Anonymous Communication Network: An Efficient and Secure Anonymous Communication Network. Sensors, 23(21), 8810. https://doi.org/10.3390/s23218810