Slotted Packet Counting Attacks on Anonymity Protocols
نویسندگان
چکیده
In this paper we present a slotted packet counting attack against anonymity protocols. Common packet counting attacks make strong assumptions on the setup and can easily lead to wrong conclusions, as we will show in our work. To overcome these limitations, we account for the variation of tra c load over time. We use correlation to express the relation between sender and receiver nodes. Our attack is applicable to many anonymity protocols. It assumes a passive attacker and works with partial knowledge of the network tra c.
منابع مشابه
A Location Based Protocol for Anonymity Protection of Nodes and Routes at Low Cost
---Mobile Ad Hoc Networks (MANETs) use various anonymous routing protocols in order to provide security from outside observers. To offer high anonymity protection at low cost, An Anonymous Location Based Efficient Routing Protocol (ALERT) is proposed. ALERT dynamically partitions the network area into zones and randomly chooses the intermediate relay nodes to form a anonymous route. ALERT achie...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملAnonymity in Tor-like systems under Timing Analysis: An Information Theoretic Perspective
“Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit” http://www.torproject.org. Indeed, as first demonstrated in [1] and bolstered by many follow up studies since, timing a...
متن کاملPHI: Path-Hidden Lightweight Anonymity Protocol at Network Layer
We identify two vulnerabilities for existing highspeed network-layer anonymity protocols, such as LAP and Dovetail. First, the header formats of LAP and Dovetail leak path information, reducing the anonymity-set size when an adversary launches topological attacks. Second, ASes can launch session hijacking attacks to deanonymize destinations. HORNET addresses these problems but incurs additional...
متن کاملProposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance
Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC protocols performance in UWSNs, particularly enhancing the effectiveness of ALOHA Protocol. In this paper, a time-saving Aloha protocol with slotted carrier sense proposed which we c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009