A deeper look at Ariadne: a privacy-preserving network layer protocol

被引:0
|
作者
Fressancourt, Antoine [1 ]
Iannone, Luigi [1 ]
Kerichard, Mael [2 ]
机构
[1] Huawei Technol, Datacom Labs 2012, Paris, France
[2] ESIR, Rennes, France
关键词
Privacy; Privacy-enhancing technology; Onion routing;
D O I
10.1007/s12243-024-01017-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We present a deeper analysis of Ariadne, a privacy-preserving network layer communication protocol that we introduced in Fressancourt and Iannone (2023). Ariadne uses a source routing approach to avoid relying on trusted third parties. In Ariadne, a source node willing to send anonymized network traffic to a destination uses a path consisting in nodes with which it has pre-shared symmetric keys. Temporary keys derived from those pre-shared keys are used to protect the communication's privacy using onion routing techniques, ensuring session unlinkability for packets following the same path. Ariadne enhances previous approaches to preserve communication privacy by introducing two novelties. First, the source route is encoded in a fixed size, sequentially encrypted vector of routing information elements, in which the elements' positions in the vector are pseudo-randomly permuted. Second, the temporary keys used to process the packets on the path are referenced using mutually known encrypted patterns. This avoids the use of an explicit key reference that could be used to de-anonymize the communications. This article enriches our previous presentation of Ariadne Fressancourt and Iannone (2023) with a set of formal proofs of its security properties. Besides, a performance evaluation of Ariadne's Rust implementation is presented to assess the ability of our protocol to protect privacy at the network layer in real-world use cases.
引用
收藏
页码:745 / 762
页数:18
相关论文
共 50 条
  • [1] Privacy-preserving registration protocol for mobile network
    Liu, He
    Liang, Mangui
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1653 - 1671
  • [2] A Look into Privacy-Preserving Blockchains
    Khan, Nida
    Nassar, Mohamed
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [3] A Privacy-Preserving Comparison Protocol
    Sutradhar, Kartick
    Om, Hari
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (06) : 1815 - 1821
  • [4] Privacy-Preserving Network Forensics
    Afanasyev, Mikhail
    Kohno, Tadayoshi
    Ma, Justin
    Murphy, Nick
    Savage, Stefan
    Snoeren, Alex C.
    Voelker, Geoffrey M.
    COMMUNICATIONS OF THE ACM, 2011, 54 (05) : 78 - 87
  • [5] Privacy-Preserving Network Aggregation
    Raeder, Troy
    Blanton, Marina
    Chawla, Nitesh V.
    Frikken, Keith
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PT I, PROCEEDINGS, 2010, 6118 : 198 - +
  • [6] Privacy-Preserving Network Provenance
    Zhang, Yuankai
    O'Neill, Adam
    Sherr, Micah
    Zhou, Wenchao
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2017, 10 (11): : 1550 - 1561
  • [7] Privacy-Preserving Network Analytics
    Hastings, Marcella
    Falk, Brett Hemenway
    Tsoukalas, Gerry
    MANAGEMENT SCIENCE, 2023, 69 (09) : 5482 - 5500
  • [8] Cryptanalysis of a Privacy-Preserving Aggregation Protocol
    Datta, Amit
    Joye, Marc
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 693 - 694
  • [9] An Efficient Privacy-Preserving Comparison Protocol
    Saha, Tushar Kanti
    Koshiba, Takeshi
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 553 - 565
  • [10] A Privacy-Preserving Voting Protocol on Blockchain
    Zhang, Wenbin
    Yuan, Yuan
    Hu, Yanyan
    Huang, Shaohua
    Cao, Shengjiao
    Chopra, Anuj
    Huang, Sheng
    PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, : 401 - 408