Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts
نویسندگان
چکیده
Large-scale communications blackouts, such as those carried out by Egypt and Libya in 2011 and Syria in 2012 and 2013, have motivated a series of projects that aim to enable citizens to communicate even in the face of such heavy-handed censorship efforts. A common theme across these proposals has been the use of wireless mesh networks. We argue that such networks are poorly equipped to serve as a meaningful countermeasure against large-scale blackouts due to their intrinsically poor scaling properties. We further argue that projects in this space must consider user safety as first design priority and thus far have failed to preserve user anonymity and to rely only on innocuous hardware. From these two insights, we frame a definition of dissent networks to capture the essential requirements for blackout circumvention solutions.
منابع مشابه
Designing Networks for Large-Scale Blackout Circumvention
Large-scale communications blackouts, such as those carried out by Egypt and Libya in 2011 and Syria in 2012 and 2013, have motivated a series of projects that aim to enable citizens to communicate even in the face of such heavy-handed censorship efforts. A common theme across these proposals has been the use of wireless mesh networks. We argue that such networks are poorly equipped to serve as...
متن کاملRangzen: Circumventing Government-Imposed Communication Blackouts
A challenging problem in dissent networking is that of circumventing large-scale communication blackouts imposed by oppressive governments. Although prior work has not focused on the need for user anonymity, we contend that it is essential. Without anonymity, governments can use communication networks to track and persecute users. A key challenge for decentralized networks is that of resource a...
متن کاملSecurity Attacks and Countermeasures for Wireless Sensor Networks: Survey
The security topic is a conclusive challenge for Wireless Sensor Networks (WSNs) due to the deployment nature and the resources limitations of wireless sensor devices used in such networks. Wireless Sensor Networks are used sometime in very sensitive applications, such as military, airports, and healthcare. Therefore, we must address the security concerns from the beginning of network design. D...
متن کاملTowards a universal friendly peer-to-peer media streaming: metrics, analysis and explorations
Peer-to-peer (P2P) paradigm has provided a disruptive market opportunity to define cost-effective multimedia streaming services, but at the same time network-oblivious P2P applications have been posing substantial technical and social challenges on network efficiency, operator economics and user performance. While end users are concerned with quality upgrade, Internet content provider (ICP) con...
متن کاملA Survey of Wormhole Attack and Countermeasures against that in Wireless Ad-hoc Networks
Wormhole attack is a Routing-Disruption Attack in ad hoc networks, those malicious nodes in these networks can bear wormhole attacks to make up a false scenario on neighbor discovery relations among mobile nodes. The attackers endanger the safety of ad hoc routing protocols with making a direct link, referred to as a wormhole tunnel, between malicious nodes. After building a wormhole tunnel, on...
متن کامل