Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.

Slides:



Advertisements
Similar presentations
CSCI 465 D ata Communications and Networks Lecture 20 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Advertisements

Chapter 7 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain the need for the transport layer.  Identify.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
The OSI Model and the TCP/IP Protocol Suite
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Local Area Networks Part II. 2 Introduction Many times it is necessary to connect a local area network to another local area network or to a wide area.
1 Version 3.0 Module 10 Routing Fundamentals and Subnetting.
Connecting LANs, Backbone Networks, and Virtual LANs
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Module 10. Internet Protocol (IP) is the routed protocol of the Internet. IP addressing enables packets to be routed from source to destination using.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
LAN Overview (part 2) CSE 3213 Fall April 2017.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
COMPUTER NETWORKS Ms. Mrinmoyee Mukherjee Assistant Professor
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Spring 2006Computer Networks1 Chapter 2 Network Models.
Module 8: Ethernet Switching
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
R. Newman Anonymity - Background. Defining anonymity Defining anonymity Need for anonymity Need for anonymity Defining privacy Defining privacy Threats.
Network Security David Lazăr.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Networks and Protocols CE Week 2a. Network hardware.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
1 Networking. 2 Network “... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations dedicated computers network.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
Ch 2. Network Models. 1. LAYERED TASKS Concept of layers – Consider two friends who communicate through mail – What happens when one sends a letter to.
Onion Routing R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
K. Salah1 Security Protocols in the Internet IPSec.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
LAN Topologies Part 1. What is topology? Topology is the physical or logical interconnection of communicating devices Physical Topology: LANtopology,
Lec # 25 Computer Network Muhammad Waseem Iqbal. Learn about the Internetworking Devices – Repeaters – Hubs – Switches – Bridges – Routers.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
Instructor & Todd Lammle
Link Layer 5.1 Introduction and services
Internetworking (Part II)
Introduction to Networking
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
CSE 4905 Network Security Overview
Net 323: NETWORK Protocols
Data Link Issues Relates to Lab 2.
Free-route Mixes vs. Cascades
Anonymity - Background
Networking.
OSI Model OSI MODEL.
Networking.
Anonymity – Chaum Mixes
Internetworking (Part II)
Presentation transcript:

Anonymity - Background R. Newman

Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity Applications of anonymity technology

User Observability in Networks Attacker: can observe messages Message contents: Data disclosure Message headers: Traffic analysis Attacker: may be able to affect/inject messages Destroy/delay Replay Modification Fabrication Attacker: may have compromised node(s) Observe whatever the node can see Perform actions as that node

Network Protocols Application Message Transport Header Application MessageTransport HeaderNetwork Header Application MessageTransport HeaderNetwork HeaderLink HeaderLink Trailer Application MessageTransport HeaderNetwork HeaderLink HeaderLink TrailerPHY Socket – map process/port via OS Interface – provide address for routing through network Medium Access – provide MAC address and deliver to next node in path Physical – modulate/sense medium, synchronize symbols, bits, boundaries Simplified version of what goes on when a message is sent

Where to protect your wires? Protect actual wires Link Layer Encryption Network Layer Encryption Transport Layer Encryption Allows policies at port and connection levels Application Layer Encryption Allows for specificity, but reveals a lot!

Physical Mechanisms Prevent eavesdropping on wires Prevent tapping Fiber optics Special cabling Still need appropriate protocols in case nodes are compromised Still need EMI emission elimination (TEMPEST)

Link Encryption Encrypt all traffic at link level Network header is not observable But.... Can still have linkability: Frame lengths Frame timing Node compromise Reveals everything!

Network Layer Encryption Encrypt at network level If network addresses encrypted, must broadcast Not scalable Implicit addressing Encrypt contents Compromise of router doesn’t lose content confidentiality But allows for traffic analysis So – encrypt true destination, encapsulate, and send to intermediate nodes These become Mixes Mix unpacks and resends

Transport Layer Encryption Encrypt at transport layer If port numbers encrypted, host has no way to route to processes/sockets Can be transparent to applications Encrypt contents Allows for endpoint (IP address/Port number) traffic analysis

Network Anonymity Forms Recipient Anonymity Know who sent a message, but not who received it Message linkability Know a message was sent, but don’t know which of the incoming messages correspond to an outgoing message Sender Anonymity Know who received a message, but not who sent it

Recipient Anonymity Broadcast All nodes receive all messages Scaling problems! Implicit addressing – recognize msgs for you Invisible – only destination can determine attribute Public key distribution (like covert channel) Visible – if not invisible Can use pseudonyms Public vs. Private Public if known to all principals Public Not invisible – else linkable

Sender-Receiver Unlinkability Mixes Sender sends to Mix Mix resends to Recipient Must prevent linking incoming messages with outgoing messages More on this when covering Chaum Mix papers

Sender Anonymity Superposed Sending DC-networks Every station generates at least one key bit per message bit Key bit is sent over secure channel to exactly one other station To send a bit, each station XORs all key bits it sent or received, plus the bit it wants to send (if any) Makes multiple access collision channel Need anonymity-preserving multiple access protocol Slotted ring w/sender remove, e.g. Can reduce traffic by PRNG distribution

End-to-end delay Store-and-forward vs. Cut-through Introduced delays (Mixes) Reliability End-to-end retransmission problematic Scalability Network load Station load Performance Issues

Chaum Mixes Generalized Mixes Measuring information leakage Next