Abstract
The I2P (Invisible Internet Project) network is a low-latency anonymous network composed of I2P routers based on garlic routing, which is mainly to protect privacy and prevent tracking, such as evading censorship and hiding whistle-blowers. As opposed to well-known and well-research Tor network, I2P aims to organize itself and distribute its anonymity. To our best knowledge, the study of I2P measurements is still insufficient. Thus, this paper proposed a novel method to measure I2P anonymous network nodes, including passive measurement and active measurement, and designed a local I2P node analysis system. Through experiments, we collected 16040 I2P nodes and analyzed properties including country distribution, bandwidth distribution and FloodingFill node attributes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gai, K., Qiu, L., Chen, M., Zhao, H., Qiu, M.: SA-EAST: security-aware efficient data transmission for its in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 1–22 (2017)
Gai, K., Qiu, M.: Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers. IEEE Trans. Ind. Inf. 14(8), 3590–3598 (2017)
Gai, K., Qiu, M., Ming, Z., Zhao, H., Qiu, L.: Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks. IEEE Trans. Smart Grid 8(5), 2431–2439 (2017)
Gai, K., Choo, K.K.R., Qiu, M., Zhu, L.: Privacy-preserving content-oriented wireless communication in internet-of-things. IEEE Internet Things J. 5(4), 3059–3067 (2018)
The onion router (tor) project, official website. https://www.torproject.org/
Zantout, B., Haraty, R.: I2P data communication system. In: Proceedings of ICN, Citeseer, pp. 401–409 (2011)
Qiu, H. Noura, H. Qiu, M. Ming, Z., Memmi, G.: A user-centric data protection method for cloud storage based on invertible DWT. IEEE Transactions on Cloud Computing (2019)
T. I. Project.: The invisible internet project. https://geti2p.net/
I2p source code. https://github.com/i2p/i2p.i2p
Conrad, B., Shirazi, F.: A survey on tor and I2P. In: Ninth International Conference on Internet Monitoring and Protection (ICIMP), pp. 22–28 (2014)
Liu, Z., Liu, Y., Winter, P., Mittal, P., Hu, Y.C.: Torpolice: towards enforcing service-defined access policies for anonymous communication in the tor network. In: 2017 IEEE 25th International Conference on Network Protocols (ICNP), pp. 1–10 (2017)
Liu, P., Wang, L., Tan, Q., Li, Q., Wang, X., Shi, J.: Empirical measurement and analysis of I2P routers. J. Netw. 9(9), 2269–2279 (2014)
Zincir-Heywood, K.S.A.N.: Weighted factors for measuring anonymity services: a case study on tor, jondonym, and I2P
Shahbar, K., Zincir-Heywood, A.N.: Effects of shared bandwidth on anonymity of the I2P network users. In: 2017 IEEE Security and Privacy Workshops (SPW), pp. 235–240 (2017)
Ye, L., Yu, X., Zhao, J., Zhan, D., Du, X., Guizani, M.: Deciding your own anonymity: user-oriented node selection in I2P. In: IEEE Access, vol. 6, pp. 71350–71359 (2018)
Hoang, N.P., Kintis, P., Antonakakis, M., Polychronakis, M.: An empirical study of the I2P anonymity network and its censorship resistance. In: Proceedings of the Internet Measurement Conference (IMC), pp. 379–392 (2018)
Timpanaro, J.P., Isabelle, C., Olivier, F.: Monitoring the I2P network. Ph.D. dissertation, Inria (2011)
Herrmann, M., Grothoff, C.: Privacy-implications of performance-based peer selection by onion-routers: a real-world case study using I2P. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 155–174. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22263-4_9
Yang, Q., Gasti, P., Balagani, K., Li, Y., Gang, Z.: Usb side-channel attack on tor. Comput. Netw. 141, 57–66 (2018)
Maxmind-geoip2. https://www.maxmind.com/
Acknowledgement
This work was supported by National Key Research & Development Plan of China under Grant 2016QY05X1000, and National Natural Science Foundation of China under Grant No.61771166.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, L., Zhang, H., Shi, J., Yu, X., Xu, H. (2019). I2P Anonymous Communication Network Measurement and Analysis. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2019. Lecture Notes in Computer Science(), vol 11910. Springer, Cham. https://doi.org/10.1007/978-3-030-34139-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-34139-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34138-1
Online ISBN: 978-3-030-34139-8
eBook Packages: Computer ScienceComputer Science (R0)