Skip to main content

I2P Anonymous Communication Network Measurement and Analysis

  • Conference paper
  • First Online:
Book cover Smart Computing and Communication (SmartCom 2019)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11910))

Included in the following conference series:

Abstract

The I2P (Invisible Internet Project) network is a low-latency anonymous network composed of I2P routers based on garlic routing, which is mainly to protect privacy and prevent tracking, such as evading censorship and hiding whistle-blowers. As opposed to well-known and well-research Tor network, I2P aims to organize itself and distribute its anonymity. To our best knowledge, the study of I2P measurements is still insufficient. Thus, this paper proposed a novel method to measure I2P anonymous network nodes, including passive measurement and active measurement, and designed a local I2P node analysis system. Through experiments, we collected 16040 I2P nodes and analyzed properties including country distribution, bandwidth distribution and FloodingFill node attributes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gai, K., Qiu, L., Chen, M., Zhao, H., Qiu, M.: SA-EAST: security-aware efficient data transmission for its in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 1–22 (2017)

    Article  Google Scholar 

  2. Gai, K., Qiu, M.: Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers. IEEE Trans. Ind. Inf. 14(8), 3590–3598 (2017)

    Article  Google Scholar 

  3. Gai, K., Qiu, M., Ming, Z., Zhao, H., Qiu, L.: Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks. IEEE Trans. Smart Grid 8(5), 2431–2439 (2017)

    Article  Google Scholar 

  4. Gai, K., Choo, K.K.R., Qiu, M., Zhu, L.: Privacy-preserving content-oriented wireless communication in internet-of-things. IEEE Internet Things J. 5(4), 3059–3067 (2018)

    Article  Google Scholar 

  5. The onion router (tor) project, official website. https://www.torproject.org/

  6. Zantout, B., Haraty, R.: I2P data communication system. In: Proceedings of ICN, Citeseer, pp. 401–409 (2011)

    Google Scholar 

  7. Qiu, H. Noura, H. Qiu, M. Ming, Z., Memmi, G.: A user-centric data protection method for cloud storage based on invertible DWT. IEEE Transactions on Cloud Computing (2019)

    Google Scholar 

  8. T. I. Project.: The invisible internet project. https://geti2p.net/

  9. I2p source code. https://github.com/i2p/i2p.i2p

  10. Conrad, B., Shirazi, F.: A survey on tor and I2P. In: Ninth International Conference on Internet Monitoring and Protection (ICIMP), pp. 22–28 (2014)

    Google Scholar 

  11. Liu, Z., Liu, Y., Winter, P., Mittal, P., Hu, Y.C.: Torpolice: towards enforcing service-defined access policies for anonymous communication in the tor network. In: 2017 IEEE 25th International Conference on Network Protocols (ICNP), pp. 1–10 (2017)

    Google Scholar 

  12. Liu, P., Wang, L., Tan, Q., Li, Q., Wang, X., Shi, J.: Empirical measurement and analysis of I2P routers. J. Netw. 9(9), 2269–2279 (2014)

    Google Scholar 

  13. Zincir-Heywood, K.S.A.N.: Weighted factors for measuring anonymity services: a case study on tor, jondonym, and I2P

    Google Scholar 

  14. Shahbar, K., Zincir-Heywood, A.N.: Effects of shared bandwidth on anonymity of the I2P network users. In: 2017 IEEE Security and Privacy Workshops (SPW), pp. 235–240 (2017)

    Google Scholar 

  15. Ye, L., Yu, X., Zhao, J., Zhan, D., Du, X., Guizani, M.: Deciding your own anonymity: user-oriented node selection in I2P. In: IEEE Access, vol. 6, pp. 71350–71359 (2018)

    Article  Google Scholar 

  16. Hoang, N.P., Kintis, P., Antonakakis, M., Polychronakis, M.: An empirical study of the I2P anonymity network and its censorship resistance. In: Proceedings of the Internet Measurement Conference (IMC), pp. 379–392 (2018)

    Google Scholar 

  17. Timpanaro, J.P., Isabelle, C., Olivier, F.: Monitoring the I2P network. Ph.D. dissertation, Inria (2011)

    Google Scholar 

  18. Herrmann, M., Grothoff, C.: Privacy-implications of performance-based peer selection by onion-routers: a real-world case study using I2P. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 155–174. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22263-4_9

    Chapter  Google Scholar 

  19. Yang, Q., Gasti, P., Balagani, K., Li, Y., Gang, Z.: Usb side-channel attack on tor. Comput. Netw. 141, 57–66 (2018)

    Article  Google Scholar 

  20. Maxmind-geoip2. https://www.maxmind.com/

Download references

Acknowledgement

This work was supported by National Key Research & Development Plan of China under Grant 2016QY05X1000, and National Natural Science Foundation of China under Grant No.61771166.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Likun Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, L., Zhang, H., Shi, J., Yu, X., Xu, H. (2019). I2P Anonymous Communication Network Measurement and Analysis. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2019. Lecture Notes in Computer Science(), vol 11910. Springer, Cham. https://doi.org/10.1007/978-3-030-34139-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34139-8_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34138-1

  • Online ISBN: 978-3-030-34139-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics