Moby: A Blackout-Resistant Anonymity Network for Mobile Devices
نویسندگان
چکیده
Internet blackouts are challenging environments for anonymity and censorship resistance. Existing popular networks (e.g., Freenet, I2P, Tor) rely on connectivity to function, making them impracticable during such blackouts. In a setting, mobile ad-hoc can provide connectivity, but prior communication protocols not designed attack resilience. We address this need by designing, implementing, evaluating Moby, blackout-resistant network devices. Moby provides end-to-end encryption, forward secrecy sender-receiver anonymity. It features bi-modal design of operation, using when available During periods functions as regular messaging application bootstraps information that is later used in the absence achieve secure anonymous communications. incorporates model trust based users’ contact lists, establishment protocol mitigates flooding attacks. perform an empirically informed simulation-based study cellphone traces 268,596 users over span week large cellular provider determine Moby’s feasibility present our findings. Last, we implement evaluate client Android app.
منابع مشابه
A Remote User Authentication Scheme with Anonymity for Mobile Devices
With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e‐commerce. When a remote server provides such e‐commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of re...
متن کاملMOBY - A Mobile Peer-to-Peer Service and Data Network
This paper describes the design and implementation of MOBY, a network for mobile peer-to-peer exchange of services and data. Constraints on computing power of mobile devices, limited hardware, networking, and software resources, and ad-hoc nature of mobile clients pose considerable challenges from the points of view of supporting performance goals, ease of service integration, and adaptation. T...
متن کاملMoneta: An Anonymity Providing Lightweight Payment System for Mobile Devices
We present a simple and efficient off-line prepaid electronic cash scheme. It uses an asymmetric security architecture to limit power and memory consumption. The client owns an ECC key pair, and RSA key pairs are used on the infrastructure side. Our system provides limited anonymity and is secure against eavesdropping. Double-spender’s identity can be revealed. The reasonable size of the coin a...
متن کاملCommunication between Power Blackout and Mobile Network Overload
In cases of power outages the communication of organizations responsible for recovery work (emergency services, public administration, energy network operators) to the public poses several challenges, primarily the breakdowns of many communication infrastructures and therefore the limitations of the use of classical communication media. This paper surveys technical concepts to support crisis co...
متن کاملConnection Interface Designing for Grid and Mobile Devices
There area lot of mobile computer devices with a variety of applications and users Tend to use them more. Due to the limitations of mobile devices, running most of the procedures are impossible. To resolve this problem, mobile devices can be connected to the grid, to use the facilities of grid. On the other hand the communication mechanisms are different for each device and they cannot be c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings on Privacy Enhancing Technologies
سال: 2022
ISSN: ['2299-0984']
DOI: https://doi.org/10.56553/popets-2022-0071