Reza Mirzaei, Nasser Yazdani, Mohammad Sayad Haghighi
{"title":"通过在匿名网络中隐藏其角色来保护实体","authors":"Reza Mirzaei, Nasser Yazdani, Mohammad Sayad Haghighi","doi":"10.1016/j.comcom.2025.108109","DOIUrl":null,"url":null,"abstract":"<div><div>Knowing the role of entities in a network undermines anonymity and facilitates the identification of their behavioral patterns. In many existing low-latency anonymity network structures, the creation and use of tunnels for packet transmission allow adversaries to discern the roles of entities. This paper explores the impact of identifying these tunnels, specifically how such identification can expose an entity’s role in relation to a particular message, potentially reducing the level of anonymity in the network. To explore this, we first discuss two key aspects of anonymity networks: the distribution of information and the homogeneity of roles. We then analyze several low-latency anonymity structures to assess vulnerabilities related to tunnel identification, evaluating their strengths and weaknesses based on the aforementioned aspects. In addition, we propose a novel network structure that addresses these vulnerabilities by eliminating the conventional tunnel mechanism, which typically requires a tunnel establishment message. This change prevents adversaries from identifying an entity’s role. In the proposed structure, the sender and intermediate relays work together to select distinct routes for each packet, removing the need for the sender to establish a dedicated data tunnel. To provide a deeper analysis, we will describe in detail the information an attacker can obtain by tracing tunneling messages and how this compromises anonymity by exposing the roles of entities. We will also evaluate how these changes affect the degree of anonymity based on the attacker’s knowledge. Our evaluation shows that the proposed technique effectively eliminates traffic patterns that would normally reveal the roles of entities, thus neutralizing the attacker’s ability to compromise anonymity. As a result, the average level of anonymity is significantly improved compared to previous structures. Overall, our findings suggest that the proposed approach offers a more effective strategy for concealing the roles of entities compared to earlier methods.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"237 ","pages":"Article 108109"},"PeriodicalIF":4.5000,"publicationDate":"2025-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Protecting an entity by hiding its role in anonymity networks\",\"authors\":\"Reza Mirzaei, Nasser Yazdani, Mohammad Sayad Haghighi\",\"doi\":\"10.1016/j.comcom.2025.108109\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Knowing the role of entities in a network undermines anonymity and facilitates the identification of their behavioral patterns. In many existing low-latency anonymity network structures, the creation and use of tunnels for packet transmission allow adversaries to discern the roles of entities. This paper explores the impact of identifying these tunnels, specifically how such identification can expose an entity’s role in relation to a particular message, potentially reducing the level of anonymity in the network. To explore this, we first discuss two key aspects of anonymity networks: the distribution of information and the homogeneity of roles. We then analyze several low-latency anonymity structures to assess vulnerabilities related to tunnel identification, evaluating their strengths and weaknesses based on the aforementioned aspects. In addition, we propose a novel network structure that addresses these vulnerabilities by eliminating the conventional tunnel mechanism, which typically requires a tunnel establishment message. This change prevents adversaries from identifying an entity’s role. In the proposed structure, the sender and intermediate relays work together to select distinct routes for each packet, removing the need for the sender to establish a dedicated data tunnel. To provide a deeper analysis, we will describe in detail the information an attacker can obtain by tracing tunneling messages and how this compromises anonymity by exposing the roles of entities. We will also evaluate how these changes affect the degree of anonymity based on the attacker’s knowledge. Our evaluation shows that the proposed technique effectively eliminates traffic patterns that would normally reveal the roles of entities, thus neutralizing the attacker’s ability to compromise anonymity. As a result, the average level of anonymity is significantly improved compared to previous structures. Overall, our findings suggest that the proposed approach offers a more effective strategy for concealing the roles of entities compared to earlier methods.</div></div>\",\"PeriodicalId\":55224,\"journal\":{\"name\":\"Computer Communications\",\"volume\":\"237 \",\"pages\":\"Article 108109\"},\"PeriodicalIF\":4.5000,\"publicationDate\":\"2025-03-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0140366425000660\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Communications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0140366425000660","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Protecting an entity by hiding its role in anonymity networks
Knowing the role of entities in a network undermines anonymity and facilitates the identification of their behavioral patterns. In many existing low-latency anonymity network structures, the creation and use of tunnels for packet transmission allow adversaries to discern the roles of entities. This paper explores the impact of identifying these tunnels, specifically how such identification can expose an entity’s role in relation to a particular message, potentially reducing the level of anonymity in the network. To explore this, we first discuss two key aspects of anonymity networks: the distribution of information and the homogeneity of roles. We then analyze several low-latency anonymity structures to assess vulnerabilities related to tunnel identification, evaluating their strengths and weaknesses based on the aforementioned aspects. In addition, we propose a novel network structure that addresses these vulnerabilities by eliminating the conventional tunnel mechanism, which typically requires a tunnel establishment message. This change prevents adversaries from identifying an entity’s role. In the proposed structure, the sender and intermediate relays work together to select distinct routes for each packet, removing the need for the sender to establish a dedicated data tunnel. To provide a deeper analysis, we will describe in detail the information an attacker can obtain by tracing tunneling messages and how this compromises anonymity by exposing the roles of entities. We will also evaluate how these changes affect the degree of anonymity based on the attacker’s knowledge. Our evaluation shows that the proposed technique effectively eliminates traffic patterns that would normally reveal the roles of entities, thus neutralizing the attacker’s ability to compromise anonymity. As a result, the average level of anonymity is significantly improved compared to previous structures. Overall, our findings suggest that the proposed approach offers a more effective strategy for concealing the roles of entities compared to earlier methods.
期刊介绍:
Computer and Communications networks are key infrastructures of the information society with high socio-economic value as they contribute to the correct operations of many critical services (from healthcare to finance and transportation). Internet is the core of today''s computer-communication infrastructures. This has transformed the Internet, from a robust network for data transfer between computers, to a global, content-rich, communication and information system where contents are increasingly generated by the users, and distributed according to human social relations. Next-generation network technologies, architectures and protocols are therefore required to overcome the limitations of the legacy Internet and add new capabilities and services. The future Internet should be ubiquitous, secure, resilient, and closer to human communication paradigms.
Computer Communications is a peer-reviewed international journal that publishes high-quality scientific articles (both theory and practice) and survey papers covering all aspects of future computer communication networks (on all layers, except the physical layer), with a special attention to the evolution of the Internet architecture, protocols, services, and applications.