PriFi: A Low-Latency Local-Area Anonymous Communication Network

10/27/2017
by   Ludovic Barman, et al.
0

Popular anonymity protocols such as Tor provide low communication latency but are vulnerable to traffic-analysis attacks that can de-anonymize users. Traffic-analysis resistant protocols typically do not achieve low-latency communication (e.g., Dissent, Riffle), or are restricted to a specific type of traffic (e.g., Herd, Aqua). In this paper, we present PriFi, the first practical protocol for anonymous communication in local-area networks that is provably secure against traffic-analysis attacks, has a low communication latency, and is traffic agnostic. PriFi is based on Dining Cryptographer's networks, and uses a 3-layer architecture which removes the usual anonymization bottleneck seen in mix networks: packets sent by the clients follow their usual path, without any additional hop that would add latency. As a second contribution, we propose a novel technique for protecting against equivocation attacks, in which a malicious relay de-anonymizes clients by sending them different information. In PriFi's architecture, this is achieved without adding extra latency; in particular, clients do not need to gossip or run consensus among themselves. Finally, we describe a technique for detecting disruption (jamming) attacks by malicious clients and a blaming mechanism to enforce accountability against such attacks. We have fully implemented PriFi and evaluated its performance with well-known datasets. Our analysis is twofold: first, we show that our architecture tolerates well client churn; second, we show that the system can be used in practice with minimal latency overhead (e.g., 70ms for 50 clients), and is compatible with delay-sensitive application such as VoIP.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/14/2021

Preventing Manipulation Attack in Local Differential Privacy using Verifiable Randomization Mechanism

Local differential privacy (LDP) has been received increasing attention ...
research
06/24/2021

Towards Language-Based Mitigation of Traffic Analysis Attacks

Traffic analysis attacks pose a major risk for online security. Distinct...
research
07/05/2023

DarkHorse: A UDP-based Framework to Improve the Latency of Tor Onion Services

Tor is the most popular anonymous communication overlay network which hi...
research
02/23/2018

TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

Modern low-latency anonymity systems, no matter whether constructed as a...
research
07/18/2023

Mitigating Intersection Attacks in Anonymous Microblogging

Anonymous microblogging systems are known to be vulnerable to intersecti...
research
04/09/2022

ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing

We present ShorTor, a protocol for reducing latency on the Tor network. ...
research
10/17/2019

A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems

Mixes, relaying routers that hide the relation between incoming and outg...

Please sign up or login with your details

Forgot password? Click here to reset