Scalable Link-Based Relay Selection for Anonymous Routing

作者: Micah Sherr , Matt Blaze , Boon Thau Loo

DOI: 10.1007/978-3-642-03168-7_5

关键词:

摘要: The performance of an anonymous path can be described using many network metrics --- e.g., bandwidth, latency, jitter, loss, etc. However, existing relay selection algorithms have focused exclusively on producing paths with high bandwidth. In contrast to traditional node-based techniques in which is biased by relays' node-characteristics (i.e., bandwidth), this paper presents the case for link-based generation weighted favor highest performing links. Link-based supports more flexible routing, enabling low and addition approaches are also secure than techniques, eliminating "hotspots" that attract a disproportionate amount traffic. For example, misbehaving relays cannot advertise themselves as "low-latency" nodes traffic, since latency has meaning only when measured between two endpoints. We argue practical certain anonymity networks, describe mechanisms efficiently storing disseminating link information.

参考文章(37)
Micah Sherr, Boon Thau Loo, Matt Blaze, Towards application-aware anonymous routing usenix conference on hot topics in security. pp. 4- ,(2007)
Robin Snader, Nikita Borisov, A Tune-up for Tor: Improving Security and Performance in the Tor Network. network and distributed system security symposium. ,(2008)
T. S. Eugene Ng, Hui Zhang, A network positioning system for the internet usenix annual technical conference. pp. 11- 11 ,(2004)
David Mazières, Karthik Lakshminarayanan, Michael J. Freedman, OASIS: anycast for any service networked systems design and implementation. pp. 10- 10 ,(2006)
Steven J Murdoch, Robert NM Watson, None, Metrics for Security and Performance in Low-Latency Anonymity Systems Privacy Enhancing Technologies. pp. 115- 132 ,(2008) , 10.1007/978-3-540-70630-4_8
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Venugopalan Ramasubramanian, Fabian Kuhn, Ittai Abraham, Archit Gupta, Dahlia Malkhi, Aditya Akella, Mahesh Balakrishnan, A Unified Network Coordinate System for Bandwidth and Latency pp. 15- ,(2008)
Damien Saucez, Benoit Donnet, Olivier Bonaventure, A reputation-based approach for securing vivaldi embedding system EUNICE'07 Proceedings of the 13th open European summer school and IFIP TC6.6 conference on Dependable and adaptable networks and services. pp. 78- 85 ,(2007) , 10.1007/978-3-540-73530-4_10
Micah Sherr, Boon Thau Loo, Matt Blaze, Veracity: practical secure network coordinates via vote-based agreements usenix annual technical conference. pp. 13- 13 ,(2009)
Les Cottrell, pathChirp: Efficient available bandwidth estimation for network paths Proc. Passive and Active Measurements Workshop, Apr. 2003. ,(2003) , 10.2172/813038