TY - GEN
T1 - More anonymity through trust degree in trust-based onion routing
AU - Zhou, Peng
AU - Luo, Xiapu
AU - Chang, Kow Chuen
PY - 2013/3/7
Y1 - 2013/3/7
N2 - Trust-based onion routing employs users' own trust to circumvent compromised onion routers. However, it runs a high risk of being deanonymized by the inference attack based on a priori trust relationship. In this paper, we first observe that the onion routers with higher trust degree (e.g., those that are trusted by more users) are more effective in defending against the inference attack. We therefore incorporate trust degree into trust-based onion routing. With a rigorous theoretical analysis, we devise an optimal strategy for router selection and an optimal routing algorithm for path selection. Both minimize the risk of deanonymization by the inference attack without sacrificing the capability of evading compromised routers. Moreover, simulation-based experiments on top of real-world social networks confirm the effectiveness of the optimal router selection.
AB - Trust-based onion routing employs users' own trust to circumvent compromised onion routers. However, it runs a high risk of being deanonymized by the inference attack based on a priori trust relationship. In this paper, we first observe that the onion routers with higher trust degree (e.g., those that are trusted by more users) are more effective in defending against the inference attack. We therefore incorporate trust degree into trust-based onion routing. With a rigorous theoretical analysis, we devise an optimal strategy for router selection and an optimal routing algorithm for path selection. Both minimize the risk of deanonymization by the inference attack without sacrificing the capability of evading compromised routers. Moreover, simulation-based experiments on top of real-world social networks confirm the effectiveness of the optimal router selection.
KW - anonymity
KW - trust degree
KW - trust-based onion routing
UR - http://www.scopus.com/inward/record.url?scp=84874514017&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-36883-7_17
DO - 10.1007/978-3-642-36883-7_17
M3 - Conference article published in proceeding or book
SN - 9783642368820
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
SP - 273
EP - 291
BT - Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Revised Selected Papers
T2 - 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012
Y2 - 3 September 2012 through 5 September 2012
ER -