A Survey on Routing in Anonymous Communication Protocols
read more
Citations
Highly Anonymous Mobility-Tolerant Location-Based Onion Routing for VANETs
Taxonomy of routing protocols in wireless sensor networks: A survey
Towards Formal Modeling of Subnet Based Hotspot Algorithm in Wireless Sensor Networks
Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges
Non-Interactive Anonymous Router
References
Ad hoc On-Demand Distance Vector (AODV) Routing
Ad-hoc on-demand distance vector routing
Chord: A scalable peer-to-peer lookup service for internet applications
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
The Sybil Attack
Related Papers (5)
Frequently Asked Questions (17)
Q2. How does the increase in traffic affect the anonymity set size?
Expanding the bandwidth by adding a new mix cascade leads to splitting up the anonymity set size among the mix cascades and the increase in traffic would have no impact on achieving stronger anonymity.
Q3. What are some examples of attacks against DHT-based protocols?
Examples of attacks against protocols that provide only a partial view of the network to the routing decision maker are route fingerprinting attacks (Danezis and Clayton 2006), and route bridging attacks (Danezis and Syverson 2008).
Q4. What is the main reason why a non-deterministic node selection makes targeted surveillance harder?
Given a large number of Tor relays that are spread around the world, and since the adversary is assumed to be local, a non-deterministic node selection makes targeted surveillance harder.
Q5. What was the first proposed system to anonymize ISDN calls?
Synchronous anonymity systems were proposed in the early 1990s by Pfitzmann et al. to anonymize ISDN telephony calls (Pfitzmann et al. 1991).
Q6. What is the way to eliminate connections that might induce security problems?
eliminating connections that might induce security problems, such as the connection between two nodes from the same IP family that may be easier to control by an adversary, can be beneficial to anonymity.
Q7. What are the building blocks of routing in an AC network?
These building blocks are node management, transfer/retrieval of node information to/by the routing decision maker, path selection, and forwarding or relaying; where path selection is the main design component of routing schemes for AC protocols.
Q8. What is the main reason why a mixnet is secure against a global adversary?
Since Mixnets are secure against a global adversary the system can consist of fewer nodes than systems that are vulnerable against a local adversary.
Q9. What is the proposed method for encrypting the address of the recipient of replies?
Chaum proposed to encrypt the address of the recipient of replies separately so that the respondent only needs to append the untraceable return address to its replies.
Q10. What is the definition of a network-restricted subset?
It may contain a network-restricted subset ( ) of all network nodes, e.g., a subset aimed at guaranteeing the quality of the communication by, for example, avoiding congested links and nodes.
Q11. What is the likelihood that nodes are selected for certain positions in a given route?
The likelihood that nodes are chosen for certain positions in a given route depends on the ratios of overall node bandwidths and node characteristics such as the IP addresses and whether they can be selected as entry node or as exit node.
Q12. What is the main reason why a mixnet is vulnerable to flooding attacks?
Mixnets are also vulnerable to flooding attacks (Serjantov et al. 2003), and there needs to be a large amount of traffic entering the system to make this attack infeasible for the adversary.
Q13. What makes Tor more resilient against DoS attacks?
Tor resilient against DoS attacks (Shirazi et al. 2015), fast, and suitable for low-latency applications, such as web browsing or instant messaging.
Q14. What is the alternative cryptographic model for mix cascades?
An alternative cryptographic model for mix cascades is using re-encryption mixes, where mixes re-encrypt messages instead of decrypting them.
Q15. Why are forward routes considered to have better anonymity?
Forward routes are considered to have better anonymity; one of the reasons for this is that reply blocks enable replay attacks on anonymous replies (Danezis et al. 2010).
Q16. What is the solution to the challenge of providing real-time network data for the initiator?
One solution to this challenge would be providing real-time network data for the routing initiator, however, this solution would worsen scalability of source-routing protocols even further.
Q17. What is the advantage of CAR over DCnets?
This allows CAR nodes and users to have a partial view of the system and the participants of the protocol, which makes CAR more scalable than DCnets.