A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

被引:2
|
作者
Chao, Daichong [1 ]
Xu, Dawei [1 ,2 ]
Gao, Feng [3 ]
Zhang, Chuan [3 ]
Zhang, Weiting [4 ]
Zhu, Liehuang [3 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Changchun Univ, Coll Cybersecur, Changchun 130022, Peoples R China
[3] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[4] Beijing Jiaotong Univ, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
来源
关键词
Security; Peer-to-peer computing; Internet; Routing; Surveys; Tutorials; Privacy; Anonymity network; attack; vulnerability; defense; formal security; TRAFFIC ANALYSIS; TOR; AUTHENTICATION; ALGORITHMS;
D O I
10.1109/COMST.2024.3350006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of safeguarding individuals' privacy rights in online activities is unmistakable in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous anonymity networks with different objectives and design principles have emerged, providing a diverse range of applications for privacy-conscious users. However, security issues in anonymity networks have persistently existed and continue to impact their survival and development. Each anonymity network presents distinct security challenges, making it more challenging for researchers to achieve a comprehensive and systematic understanding of their security. The current literature exhibits some unavoidable gaps, including the lack of vulnerability perspectives, a unified understanding of diverse attack types, defense perspectives, and theoretical perspectives. To address these gaps, we investigate prevailing attacks targeting anonymity networks from the viewpoint of network designers and operators. We use Tor, I2P, and Freenet (arguably the three most popular anonymity networks) as case studies. Starting with these attacks, we conduct an in-depth analysis of the vulnerabilities underlying them and explore related defense mechanisms and formal security. Specifically, we classify vulnerabilities into external and internal categories, utilizing the protocol stack of an anonymity network to guide the categorization of internal vulnerabilities. Furthermore, we examine their root causes. In addition to these aspects, we emphasize the importance of formal security in researching the security of anonymity networks by integrating the investigated vulnerabilities, attacks, and defenses. Through this comprehensive, thorough, and unified approach, this paper aims to provide insights into the security of anonymity networks and offer general research findings. Finally, we discuss ongoing challenges and future directions in this specific area.
引用
收藏
页码:1775 / 1829
页数:55
相关论文
共 50 条
  • [21] Adversarial Attacks and Defenses Against Deep Neural Networks: A Survey
    Ozdag, Mesut
    CYBER PHYSICAL SYSTEMS AND DEEP LEARNING, 2018, 140 : 152 - 161
  • [22] Optimus: A Framework of Vulnerabilities, Attacks, Defenses and SLA Ontologies
    Lee, Chen-Yu
    Kamongi, Patrick
    Kavi, Krishna M.
    Gomathisankaran, Mahadevan
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2015, 6 (01): : 42 - 56
  • [23] SeVuc: A study on the Security Vulnerabilities of Capsule Networks against adversarial attacks
    Marchisio, Alberto
    Nanfa, Giorgio
    Khalid, Faiq
    Hanif, Muhammad Abdullah
    Martina, Maurizio
    Shafique, Muhammad
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 96
  • [24] The Survey of RFID Attacks and Defenses
    Li, Hong
    Chen, YongHui
    He, ZhangQing
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [25] Security Attacks in Wireless Sensor Networks: A Survey
    Patel, Manish M.
    Aggarwal, Akshai
    2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP), 2013, : 329 - 333
  • [26] A Survey on Security Attacks in Wireless Sensor Networks
    Gaware, Atul
    Dhonde, S. B.
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 536 - 539
  • [27] A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures
    Wang, Xiaojie
    Zhao, Zhonghui
    Yi, Ling
    Ning, Zhaolong
    Guo, Lei
    Yu, F. richard
    Guo, Song
    ACM COMPUTING SURVEYS, 2025, 57 (03)
  • [28] Security in wireless sensor networks: a survey of attacks and countermeasures
    Martins, David
    Guyennet, Herve
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2011, 1 (1-3) : 151 - 162
  • [29] Survey of Security Threats and Attacks in Cognitive Radio Networks
    Chauhan, Kamal Kumar
    Sanger, Amit Kumar Singh
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [30] Defenses to Membership Inference Attacks: A Survey
    Hu, Li
    Yan, Anli
    Yan, Hongyang
    Li, Jin
    Huang, Teng
    Zhang, Yingying
    Dong, Changyu
    Yang, Chunsheng
    ACM COMPUTING SURVEYS, 2024, 56 (04)