Skip to main content

Anonymity Leakage Reduction in Network Latency

  • Conference paper
  • First Online:
Innovations and Advances in Computer Sciences and Engineering

Abstract

Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users’ identity as to personal, source and destination location and content information. Previous studies have shown that the average round trip times (RTT) leakage between network host location, X1 and network destination location, Y1, can be determined, [12]. Additionally, an attack from a web site with access to a network coordinate system can recover 6.8 bits/hr. of network location from one corrupt Tor router, [12]. Notably, no network capability is in existence to completely negate anonymity leakage in network latency, [12], thus, the minimization of anonymity leakage in network latency becomes critically salient. The purpose of this paper is to investigate network latency anonymity leaks, and propose practical techniques for their reduction. In this direction, we investigate the following technical question: what implementation techniques can be configured to truly reduce anonymity leaks using deployable systems. Here, an extension of the popular Tor security strategies and unique configuration of the popular network anonymity techniques (algorithms) for future implementation are presented.

Categories and Subject Descriptors

Network security. Network anonymity loss reduction. Secure networks and communication. Anonymous communications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

6 References

  1. Back, A., Moeller, U., and Stiglic, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proc. Information Hiding Workshop (IH 2001) (April 2001), LNCS 2137, pp. 245–257

    Google Scholar 

  2. Boukerche, A., El-Khatib, K., Xu, L., and Korba, L. A Novel Solution for Achieving Anonymity in Wireless Ad Hoc Networks. National Research Council of Canada and Institute for Information Technology. ACM PE-WASUN’2004, held in conjunction with the 7th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Venice, Italy. October 4-6, 2004. NRC 47402.

    Google Scholar 

  3. Chaum, D. L. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 2 (1981), 84–88.

    Article  Google Scholar 

  4. Chun, B., Culler, D., Roscoe, T., Bavier, A., Peterson, L., Wawrzoniak, M., and Bowman, M. Planetlab: an overlay testbed for broad-coverage services. SIGCOMM Comput. Commun. Rev. 33, 3 (2003), 3–12.

    Article  Google Scholar 

  5. Claessens, J. Preneel, B. and Vandewalle, J. Solutions for Anonymous Communication on the Internet. In Proceedings of the International Carnahan Conference on Security Technology, pages 298.303. IEEE, 1999.

    Google Scholar 

  6. Danezis, G., Dingledine, R., and Mathewson, N. Mixminion: Design of a Type III Anonymous Remailer Protocol. In SP ‘03: Proc. 2003 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2003), IEEE Computer Society, p. 2.

    Google Scholar 

  7. Dingledine, R., Mathewson, N., and Syverson, P. F. Tor: The second-generation onion router. In Proc. 13th USENIX Security Symposium (August 2004).

    Google Scholar 

  8. Federrath, H., et al. JAP: Java anonymous proxy. http://anon.inf.tu-dresden.de/.

  9. Gil, T. M., Kaashoek, F., Li, J., Morris, R., and Stribling, J. The “King” data set. http://pdos.csail.mit.edu/p2psim/kingdata/, 2005.

  10. Goldberg, I., and Shostack, A. Freedom network 1.0 architecture, November 1999.

    Google Scholar 

  11. Guan, F, Fu, X. Bettati, R. and Zhoa, M. An Optimal Strategy for Anonymous Communication Protocols. In Proceedings of 22nd International Conference on Distributed Computing Systems, pages 257.266. IEEE, 2002.

    Google Scholar 

  12. Hopper, N., Vasserman, E. Y., Chan-Tin, E. How Much Anonymity does Network Latency Leak? Communications of the ACM, v.24 n.2 (2007), p.84-90.

    Google Scholar 

  13. Moeller, U., Cottrell, L., Palfrader, P., and Sassaman, L. IETF draft: Mixmaster protocol version 2. http://www.ietf.org/internet-drafts/draft-sassaman-mixmaster-03.txt, 2005.

  14. Murdoch, S. J., and Danezis, G. Low-Cost Traffic Analysis of Tor. In SP ‘05: Proc. 2005 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2005), IEEE Computer Society, pp. 183–195.

    Google Scholar 

  15. Pfitzmann, A, and Waidner, M. Networks without User Observability. Computers & Security, 2(6):158.166, 1987.

    Article  Google Scholar 

  16. Reiter, M. K., and Rubin, A. D. Crowds: anonymity for web transactions. ACM Transactions on Information and System Security 1, 1 (1998), 66–92.

    Article  Google Scholar 

  17. Serjantov, A., and Sewell, P. Passive attack analysis for connection-based anonymity systems. In Proc. ESORICS 2003 (October 2003).

    Google Scholar 

  18. Syverson, P. F., Goldschlag, D. M., and Reed, M. G. Anonymous connections and onion routing. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, California, May1997), 44–54.

    Google Scholar 

  19. Syverson, P., Tsudik, G., Reed, M., and Landwehr, C. Towards an analysis of onion routing security. In Designing Privacy Enhancing Technologies: Proc. Workshop on Design Issues in Anonymity and Unobservability (July 2000), H. Federrath, Ed., Springer-Verlag, LNCS 2009, pp. 96–114.

    Google Scholar 

  20. TOR (the onion router) servers. http://proxy.org/tor.shtml, 2007.

  21. Venkatraman, L., Agrawal, D.P. Strategies for enhancing routing security in protocols for mobile ad hoc networks, in Journal of Parallel and Distributed Computing, 63.2 (February 2003), Special issue on Routing in mobile and wireless ad hoc networks, Pages: 214 – 227, Year of Publication: 2003, ISSN:0743-7315

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Longy O. Anyanwu Ed.D. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

Anyanwu, L.O., Keengwe, J., Arome, G. (2010). Anonymity Leakage Reduction in Network Latency. In: Sobh, T. (eds) Innovations and Advances in Computer Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3658-2_98

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3658-2_98

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3657-5

  • Online ISBN: 978-90-481-3658-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics