{"title":"无形互联网项目的弹性:一个计算分析","authors":"Siddique Abubakr Muntaka, Jacques Bou Abdo","doi":"10.1002/itl2.70119","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The invisible internet project (I2P) is a decentralized peer-to-peer anonymity network that protects users' privacy by routing traffic through encrypted tunnels across volunteer-run routers (nodes). Its distributed nature raises critical questions about structural resilience; specifically, how well it can withstand random (stochastic) failures and targeted (adversarial) attacks. This study models I2P's overlay using three representative network graphs or topologies: random graph (RG), scale-free (SF), and a theoretical modeling of I2P's network, herein referred to as <i>I2P Prime</i> (I2P′), all experimented with 50 000 nodes (peers) each to reflect the real-world conditions of the I2P network. Under random failures, all models exhibit high tolerance, maintaining a large connected component (LCC) even after 50% node removal, with I2P′ demonstrating the most graceful degradation in network efficiency. However, targeted attacks based on degree or betweenness centrality reveal substantial vulnerabilities. The SF network model of I2P collapsed rapidly, often below 30% node removal due to its hub-centric design. In contrast, I2P′ exhibits stronger fault tolerance, requiring nearly 50% of critical nodes to be removed before global connectivity fails. These findings highlight the structural advantages of I2P′, which strikes a balance between distributed connectivity and high resilience against both random failures and targeted attacks. For developers, enhanced adaptive peer selection and dynamic routing mechanisms could enhance robustness without undermining anonymity. For policymakers, our results highlight how targeted interventions might fragment illicit activity with minimal collateral impact. This work provides actionable insights into designing resilient anonymity networks that preserve privacy under stochastic and adversarial attacks.</p>\n </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 5","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2025-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Resilience of the Invisible Internet Project: A Computational Analysis\",\"authors\":\"Siddique Abubakr Muntaka, Jacques Bou Abdo\",\"doi\":\"10.1002/itl2.70119\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>The invisible internet project (I2P) is a decentralized peer-to-peer anonymity network that protects users' privacy by routing traffic through encrypted tunnels across volunteer-run routers (nodes). Its distributed nature raises critical questions about structural resilience; specifically, how well it can withstand random (stochastic) failures and targeted (adversarial) attacks. This study models I2P's overlay using three representative network graphs or topologies: random graph (RG), scale-free (SF), and a theoretical modeling of I2P's network, herein referred to as <i>I2P Prime</i> (I2P′), all experimented with 50 000 nodes (peers) each to reflect the real-world conditions of the I2P network. Under random failures, all models exhibit high tolerance, maintaining a large connected component (LCC) even after 50% node removal, with I2P′ demonstrating the most graceful degradation in network efficiency. However, targeted attacks based on degree or betweenness centrality reveal substantial vulnerabilities. The SF network model of I2P collapsed rapidly, often below 30% node removal due to its hub-centric design. In contrast, I2P′ exhibits stronger fault tolerance, requiring nearly 50% of critical nodes to be removed before global connectivity fails. These findings highlight the structural advantages of I2P′, which strikes a balance between distributed connectivity and high resilience against both random failures and targeted attacks. For developers, enhanced adaptive peer selection and dynamic routing mechanisms could enhance robustness without undermining anonymity. For policymakers, our results highlight how targeted interventions might fragment illicit activity with minimal collateral impact. This work provides actionable insights into designing resilient anonymity networks that preserve privacy under stochastic and adversarial attacks.</p>\\n </div>\",\"PeriodicalId\":100725,\"journal\":{\"name\":\"Internet Technology Letters\",\"volume\":\"8 5\",\"pages\":\"\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2025-08-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Internet Technology Letters\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/itl2.70119\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet Technology Letters","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/itl2.70119","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
摘要
隐形互联网项目(I2P)是一个分散的点对点匿名网络,它通过志愿者运行的路由器(节点)上的加密隧道路由流量来保护用户的隐私。它的分布式特性引发了关于结构弹性的关键问题;具体来说,它能够承受随机(随机)故障和有针对性(对抗性)攻击的能力。本研究使用三种代表性的网络图或拓扑对I2P的覆盖进行建模:随机图(RG)、无标度图(SF)和I2P网络的理论建模,这里称为I2P Prime (I2P’),所有这些都用5万个节点(对等体)进行了实验,每个节点都反映了I2P网络的真实情况。在随机故障情况下,所有模型都表现出很高的容忍度,即使在移除50%的节点后仍能保持大连接组件(LCC),而I2P '在网络效率方面表现出最优雅的退化。然而,基于程度或中间中心性的目标攻击暴露了大量的漏洞。I2P的SF网络模型迅速崩溃,由于其以枢纽为中心的设计,节点移除率经常低于30%。相比之下,I2P表现出更强的容错能力,在全球连接出现故障之前,需要移除近50%的关键节点。这些发现突出了I2P的结构优势,它在分布式连接和针对随机故障和目标攻击的高弹性之间取得了平衡。对于开发人员来说,增强的自适应对等选择和动态路由机制可以在不破坏匿名性的情况下增强鲁棒性。对于政策制定者来说,我们的研究结果强调了有针对性的干预措施如何能够以最小的附带影响粉碎非法活动。这项工作为设计在随机和对抗性攻击下保护隐私的弹性匿名网络提供了可行的见解。
Resilience of the Invisible Internet Project: A Computational Analysis
The invisible internet project (I2P) is a decentralized peer-to-peer anonymity network that protects users' privacy by routing traffic through encrypted tunnels across volunteer-run routers (nodes). Its distributed nature raises critical questions about structural resilience; specifically, how well it can withstand random (stochastic) failures and targeted (adversarial) attacks. This study models I2P's overlay using three representative network graphs or topologies: random graph (RG), scale-free (SF), and a theoretical modeling of I2P's network, herein referred to as I2P Prime (I2P′), all experimented with 50 000 nodes (peers) each to reflect the real-world conditions of the I2P network. Under random failures, all models exhibit high tolerance, maintaining a large connected component (LCC) even after 50% node removal, with I2P′ demonstrating the most graceful degradation in network efficiency. However, targeted attacks based on degree or betweenness centrality reveal substantial vulnerabilities. The SF network model of I2P collapsed rapidly, often below 30% node removal due to its hub-centric design. In contrast, I2P′ exhibits stronger fault tolerance, requiring nearly 50% of critical nodes to be removed before global connectivity fails. These findings highlight the structural advantages of I2P′, which strikes a balance between distributed connectivity and high resilience against both random failures and targeted attacks. For developers, enhanced adaptive peer selection and dynamic routing mechanisms could enhance robustness without undermining anonymity. For policymakers, our results highlight how targeted interventions might fragment illicit activity with minimal collateral impact. This work provides actionable insights into designing resilient anonymity networks that preserve privacy under stochastic and adversarial attacks.