A deeper look at Ariadne: a privacy-preserving network layer protocol

被引:0
|
作者
Fressancourt, Antoine [1 ]
Iannone, Luigi [1 ]
Kerichard, Mael [2 ]
机构
[1] Huawei Technol, Datacom Labs 2012, Paris, France
[2] ESIR, Rennes, France
关键词
Privacy; Privacy-enhancing technology; Onion routing;
D O I
10.1007/s12243-024-01017-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We present a deeper analysis of Ariadne, a privacy-preserving network layer communication protocol that we introduced in Fressancourt and Iannone (2023). Ariadne uses a source routing approach to avoid relying on trusted third parties. In Ariadne, a source node willing to send anonymized network traffic to a destination uses a path consisting in nodes with which it has pre-shared symmetric keys. Temporary keys derived from those pre-shared keys are used to protect the communication's privacy using onion routing techniques, ensuring session unlinkability for packets following the same path. Ariadne enhances previous approaches to preserve communication privacy by introducing two novelties. First, the source route is encoded in a fixed size, sequentially encrypted vector of routing information elements, in which the elements' positions in the vector are pseudo-randomly permuted. Second, the temporary keys used to process the packets on the path are referenced using mutually known encrypted patterns. This avoids the use of an explicit key reference that could be used to de-anonymize the communications. This article enriches our previous presentation of Ariadne Fressancourt and Iannone (2023) with a set of formal proofs of its security properties. Besides, a performance evaluation of Ariadne's Rust implementation is presented to assess the ability of our protocol to protect privacy at the network layer in real-world use cases.
引用
收藏
页码:745 / 762
页数:18
相关论文
共 50 条
  • [31] Privacy-preserving routing using jointly established protocol in IoT network environment
    FuZhen Zhu
    ZhaoYin Jiang
    EURASIP Journal on Wireless Communications and Networking, 2023
  • [32] Another Look at Privacy-Preserving Automated Contact Tracing
    Tang, Qiang
    ACM TRANSACTIONS ON SPATIAL ALGORITHMS AND SYSTEMS, 2022, 8 (02)
  • [33] Privacy-preserving Layer over MapReduce on Cloud
    Zhang, Xuyun
    Liu, Chang
    Nepal, Surya
    Dou, Wanchun
    Chen, Jinjun
    SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 304 - 310
  • [34] Privacy-Preserving Communication Algorithms and Network Protocols
    Ren, Jian
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 515 - 525
  • [35] Privacy-Preserving Wireless Medical Sensor Network
    Yi, Xun
    Willemson, Jan
    Nait-Abdesselam, Farid
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 118 - 125
  • [36] A Privacy-Preserving Signature Scheme for Network Coding
    Liu, Xiang
    Huang, Jie
    Wu, Yuanxi
    Zong, Guowen
    IEEE ACCESS, 2019, 7 : 109739 - 109750
  • [37] PPGAN: Privacy-preserving Generative Adversarial Network
    Liu, Yi
    Peng, Jialiang
    Yu, James J. Q.
    Wu, Yi
    2019 IEEE 25TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2019, : 985 - 989
  • [38] A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
    Aman, Muhammad Naveed
    Javaid, Uzair
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 1123 - 1139
  • [39] GSTS: A secure and privacy-preserving protocol for vehicular communications
    Lin, Xiaodong
    Sun, Xiaoting
    Ho, Pin-Han
    Shen, Xuemin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2007, 56 (06) : 3442 - 3456
  • [40] Efficient privacy-preserving decision tree classification protocol
    Ma L.
    Peng J.
    Pei Q.
    Zhu H.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 80 - 89