Abstract
One of the methods to maintain the anonymity of communicating nodes in a network is the mix technique. Mix networks have been subject to various traffic analysis attacks that aim at compromising the identities of these communication nodes. Our focus in this paper is to propose mix network schemes that are more robust against these attacks. To this end, we propose using traffic re-distribution techniques. Traffic re-distribution involves changing the number and size of messages in the network by splitting and merging the messages at network nodes and using variable size messages to confuse the attacker. The security and anonymity of the proposed techniques are evaluated against traffic analysis attacks. Performance analysis is provided to determine the effectiveness of the proposed techniques.
Similar content being viewed by others
Notes
Low-latency mix means that the intermediate nodes do not pool a large number of received messages to prevent timing correlations between senders and receivers, and then send to next hop.
References
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)
Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. Lect. Notes Comput. Sci. 1174, 137–150 (1996)
Diaz, C.: Anonymity and privacy in electronic services, Ph.D. thesis, Katholieke Universiteit Leuven, Leuven, Belgium (2005)
Kesdogan, D., Pimenidis, L.: The hitting set attack on anonymity protocols. In: Proceedings of 6th information hiding workshop (IH), pp. 326–339, Springer (2004)
Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Proceedings of 6th information hiding workshop (IH), pp. 293–308, Springer (2004)
Raymond, J.: Traffic analysis: protocols, attacks, design issues, and open problems, Lecture Notes in Computer Science (2001) 10–29
Serjantov, A., Dingledine, R., Syverson, P., et al.: From a trickle to a flood: active attacks on several mix types. In: Proceedings of information hiding workshop (IH) (2003) 36–52
Danezis, G.: Statistical disclosure attacks: traffic confirmation in open environments. In: Proceedings of security and privacy in the age of uncertainty, (SEC2003), Citeseer, pp. 421–426 (2003)
Back, A., Moller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Proceedings of information hiding workshop (IH) (2001) 245–257
Levine, B., Reiter, M., Wang, C., Wright, M.: Timing attacks in low-latency mix systems. In: Proceedings of financial cryptography: 8th international conference (FC 2004): LNCS 3110
Zhu, Y., Fu, X., Graham, B., Bettati, R., Zhao, W.: On flow correlation attacks and countermeasures in mix networks. In: Proceedings of privacy enhancing technologies workshop (PET 2004), LNCS, May (2004) 207–225
Gogolewski, M., Klonowski, M., Kutylowski, M.: Local view attack on anonymous communication. Lecture notes in computer science (book chapter) 3679 (2005) 475–488
Kesdogan, D., Agrawal, D., Pham, V., Rautenbach, D.: Fundamental limits on the anonymity provided by the MIX technique. In: Proceedings of the 2006 IEEE symposium on security and privacy (S&P’06)-Volume 00 (2006) 86–99
Wang, X., Chen, S., Jajodia, S.: Network flow watermarking attack on low-latency anonymous communication systems. In: Proceedings of the 2007 IEEE symposium on security and privacy, pp. 116–130 (2007)
Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? In: Proceedings of the 14th ACM conference on computer and communications security, ACM, pp. 92–102 (2007)
Danezis, G., Syverson, P.: Bridging and fingerprinting: epistemic attacks on route selection. Lect. Notes Comput. Sci. 5134, 151–166 (2008)
Hopper, N., Vasserman, E., Chan-Tin, E.: How much anonymity does network latency leak? In: Proceedings of the 14th ACM conference on computer and communications security, ACM, pp. 82–91 (2007)
Freedman, M.: Design and analysis of an anonymous communication channel for the free haven project. Online: http://www.freehaven.net/doc/comm.ps
Ethereal: A network protocol analyzer, http://www.ethereal.com
SoftPerfect™ Network protocol analyzer—network sniffer for windows—http://www.softperfect.com/products/networksniffer/
Houmansadr, A., Coleman, T., Kiyavash, N., Borisov, N.: On the channel capacity of network flow watermarking
I2P Design Documents: Garlic Routing—http://www.i2p.net/how_garlicrouting
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX security symposium 2 (2004) 303–320
Dingledine, R., Freedman, M., Hopwood, D., Molnar, D.: A reputation system to increase MIX-net reliability, information hiding (IH) (2001) 126–141
Danezis, G., Sassaman, L.: Heartbeat traffic to counter (n-1) attacks. In: Proceedings of the workshop on privacy in the electronic society (WPES) (2003) 89–93
McLachlan, J., Tran, A., Hopper, N., Kim, Y.: Scalable onion routing with Torsk
Shmatikov, V., Wang, M.: Measuring relationship anonymity in mix networks. In: Proceedings of the 5th ACM workshop on privacy in electronic society, ACM, pp. 59–62 (2006)
Feigenbaum, J., Johnson, A., Syverson, P.: Probabilistic analysis of onion routing in a black-box model. In: Proceedings of the 2007 ACM workshop on privacy in electronic society, ACM (2007)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Huang, D., Kandiah, V. Low-latency Mix Using Split and Merge Operations. J Netw Syst Manage 18, 244–264 (2010). https://doi.org/10.1007/s10922-010-9170-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10922-010-9170-0