Resilience of the Invisible Internet Project: A Computational Analysis

IF 0.5 Q4 TELECOMMUNICATIONS
Siddique Abubakr Muntaka, Jacques Bou Abdo
{"title":"Resilience of the Invisible Internet Project: A Computational Analysis","authors":"Siddique Abubakr Muntaka,&nbsp;Jacques Bou Abdo","doi":"10.1002/itl2.70119","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The invisible internet project (I2P) is a decentralized peer-to-peer anonymity network that protects users' privacy by routing traffic through encrypted tunnels across volunteer-run routers (nodes). Its distributed nature raises critical questions about structural resilience; specifically, how well it can withstand random (stochastic) failures and targeted (adversarial) attacks. This study models I2P's overlay using three representative network graphs or topologies: random graph (RG), scale-free (SF), and a theoretical modeling of I2P's network, herein referred to as <i>I2P Prime</i> (I2P′), all experimented with 50 000 nodes (peers) each to reflect the real-world conditions of the I2P network. Under random failures, all models exhibit high tolerance, maintaining a large connected component (LCC) even after 50% node removal, with I2P′ demonstrating the most graceful degradation in network efficiency. However, targeted attacks based on degree or betweenness centrality reveal substantial vulnerabilities. The SF network model of I2P collapsed rapidly, often below 30% node removal due to its hub-centric design. In contrast, I2P′ exhibits stronger fault tolerance, requiring nearly 50% of critical nodes to be removed before global connectivity fails. These findings highlight the structural advantages of I2P′, which strikes a balance between distributed connectivity and high resilience against both random failures and targeted attacks. For developers, enhanced adaptive peer selection and dynamic routing mechanisms could enhance robustness without undermining anonymity. For policymakers, our results highlight how targeted interventions might fragment illicit activity with minimal collateral impact. This work provides actionable insights into designing resilient anonymity networks that preserve privacy under stochastic and adversarial attacks.</p>\n </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 5","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2025-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet Technology Letters","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/itl2.70119","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

The invisible internet project (I2P) is a decentralized peer-to-peer anonymity network that protects users' privacy by routing traffic through encrypted tunnels across volunteer-run routers (nodes). Its distributed nature raises critical questions about structural resilience; specifically, how well it can withstand random (stochastic) failures and targeted (adversarial) attacks. This study models I2P's overlay using three representative network graphs or topologies: random graph (RG), scale-free (SF), and a theoretical modeling of I2P's network, herein referred to as I2P Prime (I2P′), all experimented with 50 000 nodes (peers) each to reflect the real-world conditions of the I2P network. Under random failures, all models exhibit high tolerance, maintaining a large connected component (LCC) even after 50% node removal, with I2P′ demonstrating the most graceful degradation in network efficiency. However, targeted attacks based on degree or betweenness centrality reveal substantial vulnerabilities. The SF network model of I2P collapsed rapidly, often below 30% node removal due to its hub-centric design. In contrast, I2P′ exhibits stronger fault tolerance, requiring nearly 50% of critical nodes to be removed before global connectivity fails. These findings highlight the structural advantages of I2P′, which strikes a balance between distributed connectivity and high resilience against both random failures and targeted attacks. For developers, enhanced adaptive peer selection and dynamic routing mechanisms could enhance robustness without undermining anonymity. For policymakers, our results highlight how targeted interventions might fragment illicit activity with minimal collateral impact. This work provides actionable insights into designing resilient anonymity networks that preserve privacy under stochastic and adversarial attacks.

无形互联网项目的弹性:一个计算分析
隐形互联网项目(I2P)是一个分散的点对点匿名网络,它通过志愿者运行的路由器(节点)上的加密隧道路由流量来保护用户的隐私。它的分布式特性引发了关于结构弹性的关键问题;具体来说,它能够承受随机(随机)故障和有针对性(对抗性)攻击的能力。本研究使用三种代表性的网络图或拓扑对I2P的覆盖进行建模:随机图(RG)、无标度图(SF)和I2P网络的理论建模,这里称为I2P Prime (I2P’),所有这些都用5万个节点(对等体)进行了实验,每个节点都反映了I2P网络的真实情况。在随机故障情况下,所有模型都表现出很高的容忍度,即使在移除50%的节点后仍能保持大连接组件(LCC),而I2P '在网络效率方面表现出最优雅的退化。然而,基于程度或中间中心性的目标攻击暴露了大量的漏洞。I2P的SF网络模型迅速崩溃,由于其以枢纽为中心的设计,节点移除率经常低于30%。相比之下,I2P表现出更强的容错能力,在全球连接出现故障之前,需要移除近50%的关键节点。这些发现突出了I2P的结构优势,它在分布式连接和针对随机故障和目标攻击的高弹性之间取得了平衡。对于开发人员来说,增强的自适应对等选择和动态路由机制可以在不破坏匿名性的情况下增强鲁棒性。对于政策制定者来说,我们的研究结果强调了有针对性的干预措施如何能够以最小的附带影响粉碎非法活动。这项工作为设计在随机和对抗性攻击下保护隐私的弹性匿名网络提供了可行的见解。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
3.10
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信