A Survey on Anonymous Communication Systems with a Focus on Dining Cryptographers Networks

12/16/2022
by   Mohsen Shirali, et al.
0

Traffic analysis attacks can counteract end-to-end encryption and use leaked communication metadata to reveal information about communicating parties. With an ever-increasing amount of traffic by an ever-increasing number of networked devices, communication privacy is undermined. Therefore, Anonymous Communication Systems (ACSs) are proposed to hide the relationship between transmitted messages and their senders and receivers, providing privacy properties known as anonymity, unlinkability, and unobservability. This article aims to review research in the ACSs field, focusing on Dining Cryptographers Networks (DCNs). The DCN-based methods are information-theoretically secure and thus provide unconditional unobservability guarantees. Their adoption for anonymous communications was initially hindered because their computational and communication overhead was deemed significant at that time, and scalability problems occurred. However, more recent contributions, such as the possibility to transmit messages of arbitrary length, efficient disruption handling and overhead improvements, have made the integration of modern DCN-based methods more realistic. In addition, the literature does not follow a common definition for privacy properties, making it hard to compare the approaches' gains. Therefore, this survey contributes to introducing a harmonized terminology for ACS privacy properties, then presents an overview of the underlying principles of ACSs, in particular, DCN-based methods, and finally, investigates their alignment with the new harmonized privacy terminologies. Previous surveys did not cover the most recent research advances in the ACS area or focus on DCN-based methods. Our comprehensive investigation closes this gap by providing visual maps to highlight privacy properties and discussing the most promising ideas for making DCNs applicable in resource-constrained environments.

READ FULL TEXT
research
10/23/2019

Zephyr: Hiding Metadata in a Messaging System

Private messaging over internet related services is difficult to impleme...
research
12/20/2017

An Analytical Perspective to Traffic Engineering in Anonymous Communication Systems

Anonymous communication systems (ACS) offer privacy and anonymity throug...
research
03/06/2019

A Secure Communication Scheme for Corporate and Defense Community

Security is one of the major concerns of modern communication systems. U...
research
01/04/2023

Secure Semantic Communications: Fundamentals and Challenges

Semantic communication allows the receiver to know the intention instead...
research
02/04/2022

With a Little Help from My Friends: Transport Deniability for Instant Messaging

Traffic analysis for instant messaging (IM) applications continues to po...
research
07/21/2021

A low-overhead approach for self-sovereign identity in IoT

We present a low-overhead mechanism for self-sovereign identification an...
research
10/23/2022

To Signal or Not to Signal? Layering Traffic Analysis Resistance on Secure Instant Messaging

Traffic analysis for instant messaging (IM) applications continues to po...

Please sign up or login with your details

Forgot password? Click here to reset