ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies

Prateek Mittal, Nikita Borisov

Research output: Chapter in Book/Report/Conference proceedingConference contribution

43 Scopus citations

Abstract

Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P setting introduces many new opportunities for attack, and previous designs do not provide an adequate level of anonymity. We propose ShadowWalker: a new low-latency P2P anonymous communication system, based on a random walk over a redundant structured topology. We base our design on shadows that redundantly check and certify neighbor information; these certifications enable nodes to perform random walks over the structured topology while avoiding route capture and other attacks. We analytically calculate the anonymity provided by ShadowWalker and show that it performs well for moderate levels of attackers, and is much better than the state of the art. We also design an extension that improves forwarding performance at a slight anonymity cost, while at the same time protecting against selective DoS attacks. We show that our system has manageable overhead and can handle moderate churn, making it an attractive new design for P2P anonymous communication.

Original languageEnglish (US)
Title of host publicationCCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security
Pages161-172
Number of pages12
DOIs
StatePublished - Dec 1 2009
Externally publishedYes
Event16th ACM Conference on Computer and Communications Security, CCS'09 - Chicago, IL, United States
Duration: Nov 9 2009Nov 13 2009

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other16th ACM Conference on Computer and Communications Security, CCS'09
CountryUnited States
CityChicago, IL
Period11/9/0911/13/09

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Keywords

  • Anonymity
  • Peer-to-peer
  • Random walks

Fingerprint Dive into the research topics of 'ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies'. Together they form a unique fingerprint.

  • Cite this

    Mittal, P., & Borisov, N. (2009). ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies. In CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security (pp. 161-172). (Proceedings of the ACM Conference on Computer and Communications Security). https://doi.org/10.1145/1653662.1653683