首页> 外文期刊>Communications Surveys & Tutorials, IEEE >Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics
【24h】

Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics

机译:探索匿名网络中现存和新兴的问题:协议和度量标准的分类和调查

获取原文
获取原文并翻译 | 示例
           

摘要

The desire to preserve privacy in cyberspace drives research in the area of anonymous networks. Any entity operating in cyberspace is susceptible to debilitating cyber attacks. As part of the National Strategy to Secure Cyberspace, the United States acknowledges that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Indeed, today's Internet is an incredibly effective, uncontrolled weapon for eavesdropping and spying. Therefore, anonymity and privacy are increasingly important issues. A plethora of existing or proposed anonymous networks achieve diverse levels of anonymity against a variety of adversarial attacks. However, no known taxonomy provides a comprehensive classification of the varied set of wired, wireless, and hybrid anonymous communications networks. We develop a novel cubic taxonomy to facilitate the systematic definition and classification of anonymity in anonymous communications networks. Three key anonymity components: anonymity property, adversary capability, and network type are thoroughly explored. More importantly, an in-depth description of a new tree-based taxonomy for the state-of-the-art in wireless anonymous protocols is offered. For completeness, a tree-based taxonomy of wired and hybrid anonymous protocols are also provided. Lastly, several evolving anonymity metrics which quantify anonymity preservation, degradation, and elimination in existing and future anonymous networks are examined. Hence, this paper explores extant and emerging issues in anonymous networks via an intuitive taxonomy and surveys anonymous protocols and quantifiable metrics essential for any entity determined to assure anonymity and preserve privacy in cyberspace against an adversary.
机译:保护网络空间隐私的愿望推动了匿名网络领域的研究。在网络空间中运营的任何实体都容易遭受破坏性的网络攻击。作为“确保网络空间安全国家战略”的一部分,美国承认,网络攻击的速度和匿名性使得难以区分恐怖分子,罪犯和民族国家的行动。的确,当今的互联网是窃听和监视的极其有效,不受控制的武器。因此,匿名和隐私日益重要。大量现有的或提议的匿名网络实现了针对各种对抗性攻击的不同级别的匿名性。但是,没有已知的分类法对有线,无线和混合匿名通信网络的不同集合提供全面的分类。我们开发了一种新颖的三次分类法,以方便匿名通信网络中匿名的系统定义和分类。彻底探讨了三个关键的匿名性组成部分:匿名性,对手能力和网络类型。更重要的是,提供了有关无线匿名协议中最新技术的基于树的新分类法的深入描述。为了完整起见,还提供了有线和混合匿名协议的基于树的分类法。最后,研究了几种不断发展的匿名性度量标准,这些度量标准量化了现有和将来的匿名网络中的匿名性保留,降级和消除。因此,本文通过直观的分类法探索了匿名网络中现存的和正在出现的问题,并调查了匿名协议和可量化的度量标准,这些度量对于任何确定为确保匿名性并保护网络空间免受对手隐私的实体都是必不可少的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号