Title
Preventing active timing attacks in low-latency anonymous communication
Abstract
Low-latency anonymous communication protocols in general, and the popular onion-routing protocol in particular, are broken against simple timing attacks. While there have been few proposed solutions to this problem when the adversary is active, several padding schemes have been proposed to defend against a passive adversary that just observes timing patterns. Unfortunately active adversaries can break padding schemes by inserting delays and dropping messages. We present a protocol that provides anonymity against an active adversary by using a black-box padding scheme that is effective against a passive adversary. Our protocol reduces, in some sense, providing anonymous communication against active attacks to providing a padding scheme against passive attacks. Our analytical results show that anonymity can be made arbitrarily good at the cost of some added latency and required bandwidth. We also perform measurements on the Tor network to estimate the real-world performance of our protocol, showing that the added delay is not excessive.
Year
Venue
Keywords
2010
Privacy Enhancing Technologies
added latency,black-box padding scheme,active timing attack,added delay,popular onion-routing protocol,active attack,padding scheme,passive attack,low-latency anonymous communication protocol,active adversary,low-latency anonymous communication,passive adversary,low latency,timing attack,routing protocol
Field
DocType
Volume
Internet privacy,Computer security,Computer science,Latency (engineering),Computer network,Timing attack,Adversary,Anonymity,Latency (engineering),IP forwarding,Padding,Communications protocol
Conference
6205
ISSN
ISBN
Citations 
0302-9743
3-642-14526-4
10
PageRank 
References 
Authors
0.55
30
3
Name
Order
Citations
PageRank
Joan Feigenbaum14714711.33
Aaron Johnson238020.14
Paul Syverson34713457.55