Inference attacks against trust-based onion routing: Trust degree to the rescue

نویسندگان

  • Peng Zhou
  • Xiapu Luo
  • Rocky K. C. Chang
چکیده

Trust-based onion routing enhances anonymity protection by means of constructing onion circuits using trust-based routers. However, attackers who have the knowledge of a priori trust distributions are still capable of largely reducing the anonymity protected by trustbased circuits. The root cause is that these attackers have a high probability to guess the users who initiate trust-based circuits through the routers trusted by few other users (i.e., inference attacks). In this paper, we uncover trust degree, an essential feature of routing anonymity that is effective in defeating inference attacks but has been overlooked in the design of existing trust-based onion routing. We conduct an isolated model based analysis to understand why the trust degree is effective and how it can be used to resist inference attacks. Our major contributions are three-fold. First, we present a model to exclusively reason about inference attacks in trust-based onion routing. This model isolates the anonymity compromised by inference attacks from other attacks (e.g., correlation-like attacks), and hence derives an exclusive design space that reveals trust degree as the key feature against inference attacks. Second, to show the usefulness of our model, we design a new routing algorithm by taking into account of trust degree. Our algorithm can protect anonymity against inference attacks without sacrificing the capability against attackers’ routers. Third, we compare trust-based routing algorithms with and without considering trust degree using real-world social networking datasets. These comparisons present evidence to confirm the effectiveness of trust degree in defeating inference attacks under realworld settings. a 2013 Elsevier Ltd. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

More Anonymity through Trust Degree in Trust-Based Onion Routing

Trust-based onion routing employs users’ own trust to circumvent compromised onion routers. However, it runs a high risk of being deanonymized by the inference attacks based on a priori trust relationships. In this paper, we first observe that the onion routers with higher trust degrees (e.g., those that are trusted by more other users) are more effective in defending against the inference atta...

متن کامل

Towards More Trustworthy Trust- Based Systems for Anonymity and Web Security

In today’s Internet, trust has been widely used to design anonymity and security enhanced systems. Some of these trust-based systems have been successfully deployed in the Internet for a long time and benefit a large population of Internet users. In particular, trust-based onion routing network is a representative example for the use of trust in protecting anonymity. As one of the most popular ...

متن کامل

Trust Based Data Security and Secure Anonymous Routing For MANETs

For many applications of the mobile ad hoc networks (MANETs) deployed in adversary environments, anonymous communications with data confidentiality and integrity is important. A major requirement is to provide unidentifiability and unlinkability to the mobile nodes and their traffics.The existing protocols are vulnerable to security threats like global eavesdropper attacks, fake routing packets...

متن کامل

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 39  شماره 

صفحات  -

تاریخ انتشار 2013