Traffic analysis attacks and trade-offs in anonymity providing systems

156Citations
Citations of this article
91Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We discuss problems and trade-offs with systems providing anonymity for web browsing (or more generally any communication system that requires low latency interaction). We focus on two main systems: the Freedom network [12] and PipeNet [8]. Although Freedom is efficient and reasonably secure against denial of service attacks, it is vulnerable to some generic traffic analysis attacks, which we describe. On the other hand, we look at PipeNet, a simple theoretical model which protects against the traffic analysis attacks we point out, but is vulnerable to denial of services attacks and has efficiency problems. In light of these observations, we discuss the trade-offs that one faces when trying to construct an efficient low latency communication system that protects users anonymity. © 2001 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Back, A., Möller, U., & Stiglic, A. (2001). Traffic analysis attacks and trade-offs in anonymity providing systems. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2137, 245–257. https://doi.org/10.1007/3-540-45496-9_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free