2016
DOI: 10.1515/popets-2017-0007
|View full text |Cite
|
Sign up to set email alerts
|

PHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer

Abstract: Abstract:We identify two vulnerabilities for existing highspeed network-layer anonymity protocols, such as LAP and Dovetail. First, the header formats of LAP and Dovetail leak path information, reducing the anonymity-set size when an adversary launches topological attacks. Second, ASes can launch session hijacking attacks to deanonymize destinations. HOR-NET addresses these problems but incurs additional bandwidth overhead and latency. In this paper, we propose PHI, a Path-HIdden lightweight anonymity protocol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(22 citation statements)
references
References 30 publications
0
21
1
Order By: Relevance
“…Exploiting User Behavior Exploiting Routing Changes Vanilla Tor [19] Novel ( §5. [36] Known (Resistance) [36] Novel ( §7.1) Astoria [50] Known [36] HORNET [11] Novel ( §5.4) Novel ( §7.2) Dovetail [56] Novel ( §6.2) PHI [12] Novel ( §B.2) LAP [31] Novel (implied by §5.4) Novel (implied by §7.2)…”
Section: Exploiting Client Mobilitymentioning
confidence: 99%
See 2 more Smart Citations
“…Exploiting User Behavior Exploiting Routing Changes Vanilla Tor [19] Novel ( §5. [36] Known (Resistance) [36] Novel ( §7.1) Astoria [50] Known [36] HORNET [11] Novel ( §5.4) Novel ( §7.2) Dovetail [56] Novel ( §6.2) PHI [12] Novel ( §B.2) LAP [31] Novel (implied by §5.4) Novel (implied by §7.2)…”
Section: Exploiting Client Mobilitymentioning
confidence: 99%
“…Systems such as DeNASA, Astoria, TAPS, and Counter-RAPTOR have modified path-selection algorithms for onion routing to mitigate the threat of AS-level adversaries [4,36,50,58]. Systems such as LAP, Dovetail, PHI, and HORNET have moved cryptographic functionality for anonymous communication from end hosts into the Internet routing infrastructure to improve performance [11,12,31,56].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Tagging is implemented in the SSL handshake protocols, by embedding a tag into the random value field in the ClientHello message. -LAP [21], Dovetail [37], HORNET [7], and PHI [8] are network-layer protocols that aim to provide lowlatency and high-throughput anonymous communication. In these protocols, the source and destination addresses are encrypted so that the intermediate routing node only knows its adjacent nodes in the path (similar to Tor).…”
Section: Background and Related Workmentioning
confidence: 99%
“…Since the first proposal of an anonymous network by David Chaum in 1981 [1], much research has been proposed to further improve the concept either through greater anonymity [2][3] [4], or faster performance [5] [6] [7]. However focus has been on Internet users and traffic.…”
Section: Introductionmentioning
confidence: 99%