DeepAI AI Chat
Log In Sign Up

TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer

by   Chen Chen, et al.
Corporation de l'ecole Polytechnique de Montreal
ETH Zurich
Carnegie Mellon University

Modern low-latency anonymity systems, no matter whether constructed as an overlay or implemented at the network layer, offer limited security guarantees against traffic analysis. On the other hand, high-latency anonymity systems offer strong security guarantees at the cost of computational overhead and long delays, which are excessive for interactive applications. We propose TARANET, an anonymity system that implements protection against traffic analysis at the network layer, and limits the incurred latency and overhead. In TARANET's setup phase, traffic analysis is thwarted by mixing. In the data transmission phase, end hosts and ASes coordinate to shape traffic into constant-rate transmission using packet splitting. Our prototype implementation shows that TARANET can forward anonymous traffic at over 50 Gbps using commodity hardware.


page 1

page 2

page 3

page 4


Expanding across time to deliver bandwidth efficiency and low latency

Datacenters need networks that support both low-latency and high-bandwid...

PriFi: A Low-Latency Local-Area Anonymous Communication Network

Popular anonymity protocols such as Tor provide low communication latenc...

Parking Packet Payload with P4

Network Function (NF) deployments suffer from poor link goodput, because...

Stealthy Opaque Predicates in Hardware – Obfuscating Constant Expressions at Negligible Overhead

Opaque predicates are a well-established fundamental building block for ...

To Signal or Not to Signal? Layering Traffic Analysis Resistance on Secure Instant Messaging

Traffic analysis for instant messaging (IM) applications continues to po...

Reduced I/O Latency with Futures

Task parallelism research has traditionally focused on optimizing comput...

OblivIO: Securing reactive programs by oblivious execution with bounded traffic overheads

Traffic analysis attacks remain a significant problem for online securit...