Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks

被引:0
|
作者
Diaz, Claudia [1 ]
Murdoch, Steven J. [2 ]
Troncoso, Carmela [1 ]
机构
[1] KU Leuven IBBT, ESAT SCD COSIC, Louvain, Belgium
[2] Univ Cambridge, Comp Lab, Cambridge, England
来源
关键词
MIX-NETWORKS; CASCADES; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Low-latency anonymous communication networks require padding to resist timing analysis attacks, and dependent link padding has been proven to prevent these attacks with minimal overhead. In this paper we consider low-latency anonymity networks that implement dependent link padding, and examine various network topologies. We find that the choice of the topology has an important influence on the padding overhead and the level of anonymity provided, and that Stratified networks offer the best trade-off between them. We show that fully connected network topologies (Free Routes) are impractical when dependent link padding is used, as they suffer from feedback effects that induce disproportionate amounts of padding; and that Cascade topologies have the lowest padding overhead at the cost of poor scalability with respect to anonymity. Furthermore, we propose an variant of dependent link padding that considerably reduces the overhead at no loss in anonymity with respect to external adversaries. Finally, we discuss how Tor, a deployed large-scale anonymity network, would need to be adapted to support dependent link padding.
引用
收藏
页码:184 / +
页数:3
相关论文
共 50 条
  • [1] A longitudinal approach to measuring the impact of mobility on low-latency anonymity networks
    Doswell, Stephen
    Aslam, Nauman
    Kendall, David
    Sexton, Graham
    [J]. 2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 108 - 113
  • [2] Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency-Choose Two
    Das, Debajyoti
    Meiser, Sebastian
    Mohammadi, Esfandiar
    Kate, Aniket
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 108 - 126
  • [3] Metrics for security and performance in low-latency anonymity systems
    Murdoch, Steven J.
    Watson, Robert N. M.
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2008, 5134 : 115 - 132
  • [4] Instant Degradation of Anonymity in Low-Latency Anonymisation Systems
    Ries, Thorsten
    State, Radu
    Engel, Thomas
    [J]. DEPENDABLE NETWORKS AND SERVICES, 2012, 7279 : 98 - 108
  • [5] Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
    Chakravarty, Sambuddho
    Stavrou, Angelos
    Keromytis, Angelos D.
    [J]. COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 249 - +
  • [6] Deploying low-latency anonymity - Design challenges and social factors
    Dingledine, Roger
    Mathewson, Nick
    Syverson, Paul
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (05) : 83 - 87
  • [7] On the Trade-off between Relationship Anonymity and Communication Overhead in Anonymity Networks
    Vukovic, Ognjen
    Dan, Gyorgy
    Karlsson, Gunnar
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [8] Anonymity Leakage Reduction in Network Latency
    Anyanwu, Longy O.
    Keengwe, Jared
    Arome, Gladys
    [J]. INNOVATIONS AND ADVANCES IN COMPUTER SCIENCES AND ENGINEERING, 2010, : 561 - +
  • [9] Low latency anonymity with mix rings
    Burnside, Matthew
    Keromytis, Angelos D.
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 32 - 45
  • [10] How Much Anonymity does Network Latency Leak?
    Hopper, Nicholas
    Vasserman, Eugene Y.
    Chan-Tin, Eric
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (02)