Defying Censorship with Multi-Circuit Tor and Linear Network Coding

Anonymity networks are an increasingly important part of Internet evolution to providing practical mechanisms to enhance anonymity and security of network users. The best known anonymity network, The Onion Routing (Tor), is not only subject to user deanonymization attacks but also subject to censors...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:2019 12th CMI Conference on Cybersecurity and Privacy (CMI) S. 1 - 6
Hauptverfasser: Engelmann, Anna, Jukan, Admela
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: IEEE 01.11.2019
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Anonymity networks are an increasingly important part of Internet evolution to providing practical mechanisms to enhance anonymity and security of network users. The best known anonymity network, The Onion Routing (Tor), is not only subject to user deanonymization attacks but also subject to censorship attacks by blocking the public and secret Tor entry routers, e.g., bridges, or by jamming Tor traffic to prevent users to access Tor network. To help further evolution of anonymity networks, we focus in this work on censorship attacks, and propose to enhance the well-known multipath Tor technique with linear network coding (LNC). We analyze anonymity, privacy and censorship success considering different types of adversaries and the amount of honest and compromised components in the Tor and in the underlying network. The results show that LNC can significantly improve the robustness of Tor against censorship and maintain sufficient anonymity and privacy levels.
AbstractList Anonymity networks are an increasingly important part of Internet evolution to providing practical mechanisms to enhance anonymity and security of network users. The best known anonymity network, The Onion Routing (Tor), is not only subject to user deanonymization attacks but also subject to censorship attacks by blocking the public and secret Tor entry routers, e.g., bridges, or by jamming Tor traffic to prevent users to access Tor network. To help further evolution of anonymity networks, we focus in this work on censorship attacks, and propose to enhance the well-known multipath Tor technique with linear network coding (LNC). We analyze anonymity, privacy and censorship success considering different types of adversaries and the amount of honest and compromised components in the Tor and in the underlying network. The results show that LNC can significantly improve the robustness of Tor against censorship and maintain sufficient anonymity and privacy levels.
Author Jukan, Admela
Engelmann, Anna
Author_xml – sequence: 1
  givenname: Anna
  surname: Engelmann
  fullname: Engelmann, Anna
  organization: Technische Universität Carolo-Wilhelmina zu Braunschweig,Germany
– sequence: 2
  givenname: Admela
  surname: Jukan
  fullname: Jukan, Admela
  organization: Technische Universität Carolo-Wilhelmina zu Braunschweig,Germany
BookMark eNotj8tqAjEYRlOoi9b6BKWQF5hpbjPJvyzpTRjbja7lN5caajOSGRHfvoJuvrM6B757cpv7HAh54qzmnMGzXcyVYVzXgnGoDbSCK31DZqAN18JwYZq2vSP2NcRTyj_Uhjz0ZdimPT2mcUsXh92YKpuKO6SRLvtCMXvapRyw0K8wHvvyS23vz-4DmUTcDWF25ZSs3t-W9rPqvj_m9qWrkmByrBDaIGTDEVB4paBhOqIyyjlEHl1zHg9Rmg1EhrCB1jEtuQLphXfCSTklj5duCiGs9yX9YTmtr9fkP4MmSGU
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CMI48017.2019.8962147
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781728128566
1728128560
EndPage 6
ExternalDocumentID 8962147
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i203t-a96e2351a9a2d449507fa484ccaa1fc5a1fd9f38b9f0a9b96c0731493d2dc2c33
IEDL.DBID RIE
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000540917000012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Thu Jun 29 18:38:09 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i203t-a96e2351a9a2d449507fa484ccaa1fc5a1fd9f38b9f0a9b96c0731493d2dc2c33
PageCount 6
ParticipantIDs ieee_primary_8962147
PublicationCentury 2000
PublicationDate 2019-Nov.
PublicationDateYYYYMMDD 2019-11-01
PublicationDate_xml – month: 11
  year: 2019
  text: 2019-Nov.
PublicationDecade 2010
PublicationTitle 2019 12th CMI Conference on Cybersecurity and Privacy (CMI)
PublicationTitleAbbrev PCTDDE
PublicationYear 2019
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7036155
Snippet Anonymity networks are an increasingly important part of Internet evolution to providing practical mechanisms to enhance anonymity and security of network...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Bridge circuits
Censorship
Cryptography
Jamming
Network coding
Privacy
Servers
Title Defying Censorship with Multi-Circuit Tor and Linear Network Coding
URI https://ieeexplore.ieee.org/document/8962147
WOSCitedRecordID wos000540917000012&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED61FQMToBbxlgdGTBM78WMOVDAQdShSt8rxQ8qSoJDy-7GdqAiJhcWyLMuWz4_zd77PB3BvvM52ThicG-MBir8yY5lXDOcuMczyVDE2BJvgZSm2W7mewMOBC2Otjc5n9jFk41u-afU-mMqWQrIQVmcKU87ZwNUaSTlpIpfF22v4C4UHfy2_AIa6v4KmRJ2xOvlfb6ew-CHfofVBrZzBxDZzKJ5sJCShwsPONroeo2BCRZFAi4u60_u6R5u2Q6oxyCNMv4JROfh4o6INTS3gffW8KV7wGP8A1yShPVaSWULzVElFTOaRTMKdykTmha5Sp3OfGOmoqKRLlKwk036_esRDDTGaaErPYda0jb0AJCoihMtoOFMyyq2wVOYmPGUxyTWpLmEeBLD7GL642I1jv_q7-BqOg4wHSt4NzPpub2_hSH_19Wd3F-flG5BRj2c
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFH_MKehJZRO_zcGjdW2Spsm5Ojbcyg4TdhtpPqCXVmrr32_SjongxUsIISTk5ePl9_J-eQCP2ulsa7kOYq0dQHFX5kDEOQtiG2pmkkgy1gebSLKMbzZiNYCnPRfGGNM5n5lnn-3e8nWlWm8qm3DBfFidAziMKcVhz9ba0XKiUEzS5dz_hpJ4jy23BPrav8KmdFpjevq__s5g_EO_Q6u9YjmHgSlHkL6YjpKEUgc8q875GHkjKuootEFa1KotGrSuaiRLjRzGdGsYZb2XN0or39QY3qev63QW7CIgBAUOSRNIwQwmcSSFxJo6LBMmVlJOndhlZFXsEi0s4bmwoRS5YMrtWId5iMZaYUXIBQzLqjSXgHiOObeU-FOFksRwQ0Ss_WMWE4nC-RWMvAC2H_0nF9vd2K__Ln6A49l6udgu5tnbDZx4efcEvVsYNnVr7uBIfTXFZ33fzdE3N7WSrg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2019+12th+CMI+Conference+on+Cybersecurity+and+Privacy+%28CMI%29&rft.atitle=Defying+Censorship+with+Multi-Circuit+Tor+and+Linear+Network+Coding&rft.au=Engelmann%2C+Anna&rft.au=Jukan%2C+Admela&rft.date=2019-11-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FCMI48017.2019.8962147&rft.externalDocID=8962147