Location diversity in anonymity networks

Nick Feamster, Roger Dingledine

Research output: Chapter in Book/Report/Conference proceedingConference contribution

70 Scopus citations

Abstract

Anonymity networks have long relied on diversity of node location for protection against attacks - typically an adversary who can observe a larger fraction of the network can launch a more effective attack. We investigate the diversity of two deployed anonymity networks, Mixmaster and Tor, with respect to an adversary who controls a single Internet administrative domain. Specifically, we implement a variant of a recently proposed technique that passively estimates the set of administrative domains (also known as autonomous systems, or ASes) between two arbitrary end-hosts without having access to either end of the path. Using this technique, we analyze the AS-level paths that are likely to be used in these anonymity networks. We find several cases in each network where multiple nodes are in the same administrative domain. Further, many paths between nodes, and between nodes and popular endpoints, traverse the same domain.

Original languageEnglish (US)
Title of host publicationWPES'04
Subtitle of host publicationProceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
PublisherAssociation for Computing Machinery
Pages66-76
Number of pages11
ISBN (Print)1581139683, 9781581139686
DOIs
StatePublished - 2004
EventWPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society - Washington, DC, United States
Duration: Oct 28 2004Oct 28 2004

Publication series

NameWPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society

Other

OtherWPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
Country/TerritoryUnited States
CityWashington, DC
Period10/28/0410/28/04

All Science Journal Classification (ASJC) codes

  • General Engineering

Keywords

  • Anonymity
  • Interdomain routing
  • Mix networks

Fingerprint

Dive into the research topics of 'Location diversity in anonymity networks'. Together they form a unique fingerprint.

Cite this