Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3465481.3465768acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article
Open access

Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls

Published: 17 August 2021 Publication History

Abstract

Onion routing is a promising approach to implement anonymous voice calls. Uniform-sized voice packets are routed via multiple relays and encrypted in layers to avoid a correlation of packet content in different parts in the network. By using pre-built circuits, onion encryption may use efficient symmetric ciphers. However, if packets are forwarded by relays as fast as possible—to minimize end-to-end latency—network flow watermarking may still de-anonymize users. A recently proposed countermeasure synchronizes the start time of many calls and batch processes voice packets with the same sequence number in relays. However, if only a single link with high latency is used, it will also negatively affect latency of all other calls. This article explores the limits of this approach by formulating a mixed integer linear program (MILP) that minimizes latency “bottlenecks” in path selection. Furthermore, we suggest a different scheduling strategy for voice packets, i.e. implementing independent de-jitter buffers for all flows. In this case, a MILP is used to minimize the average latency of selected paths. For comparison, we solve the MILPs using latency and bandwidth datasets obtained from the Tor network. Our results show that batch processing cannot reliably achieve acceptable end-to-end latency (below 400 ms) in such a scenario, where link latencies are too heterogeneous. In contrast, when using de-jitter buffers for packet scheduling, path selection benefits from low latency links without degrading anonymity. Consequently, acceptable end-to-end latency is possible for a large majority of calls.

References

[1]
Masoud Akhoondi, Curtis Yu, and Harsha V Madhyastha. 2012. LASTor: A Low-Latency AS-Aware Tor Client. In IEEE SP. 476–490.
[2]
Robert Annessi and Martin Schmiedecker. 2016. Navigator: Finding Faster Paths to Anonymity. In IEEE EuroS&P. 214–226.
[3]
Eric Chan-Tin and Nicholas Hopper. 2011. Accurate and Provably Secure Latency Estimation with Treeple. In NDSS.
[4]
David Chaum. 1981. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Commun. ACM 24, 2 (1981), 84–90.
[5]
Chen Chen, Daniele E Asoni, Adrian Perrig, David Barrera, George Danezis, and Carmela Troncoso. 2018. TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer. In IEEE EuroS&P. 137–152.
[6]
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate. 2018. Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. In IEEE SP. 108–126.
[7]
Roger Dingledine and Nick Mathewson. 2019. Tor Path Specification. https://gitweb.torproject.org/torspec.git/tree/path-spec.txt(visited on 03/09/2021).
[8]
Roger Dingledine, Nick Mathewson, and Paul Syverson. 2004. Tor: The Second-Generation Onion Router. In 13th USENIX Security.
[9]
Danny Dolev and Andrew Yao. 1983. On the Security of Public Key Protocols. IEEE Transactions on Information Theory 29, 2 (1983), 198–208.
[10]
Christian Franck and Uli Sorger. 2016. Untraceable VoIP Communication based on DC-nets. arXiv preprint arXiv:1610.06549(2016).
[11]
International Telecommunication Union 2003. One-way transmission time(ITU-T recommendation G.114 ed.). International Telecommunication Union.
[12]
Younchan Jung and Caroline Manzano. 2014. Burst packet loss and enhanced packet loss-based quality model for mobile voice-over Internet protocol applications. IET Communications 8, 1 (2014), 41–49.
[13]
David Lazar, Yossi Gilad, and Nickolai Zeldovich. 2019. Yodel: Strong Metadata Security for Voice Calls. In 27th ACM SOSP. 211–224.
[14]
Stevens Le Blond, David Choffnes, William Caldwell, Peter Druschel, and Nicholas Merritt. 2015. Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems. ACM SIGCOMM 45, 4 (2015), 639–652.
[15]
Jonathan Mayer, Patrick Mutchler, and John C. Mitchell. 2016. Evaluating the privacy properties of telephone metadata. Proceedings of the National Academy of Sciences 113, 20(2016), 5536–5541.
[16]
Andriy Panchenko and Johannes Renner. 2009. Path Selection Metrics for Performance-Improved Onion Routing. In SAINT. 114–120.
[17]
Tor Project. 2019. Tor Directory Protocol, Version 3. https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt.
[18]
David Schatz, Michael Rossberg, and Guenter Schaefer. 2017. Reducing Call Blocking Rates For Anonymous Voice Over IP Communications. In IEEE ICUMT. 377–385.
[19]
David Schatz, Michael Rossberg, and Guenter Schaefer. 2021. Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing. In ICISSP. 191–203.
[20]
David Schatz, Michael Rossberg, and Guenter Schaefer. 2021. Large-scale Latency Measurements in the Tor Network (v1.0). https://doi.org/10.5281/zenodo.4911583
[21]
Piyush Kumar Sharma, Shashwat Chaudhary, Nikhil Hassija, Mukulika Maity, and Sambuddho Chakravarty. 2020. The Road Not Taken: Re-thinking the Feasibility of Voice Calling Over Tor. PETS 2020, 4 (2020), 69–88.
[22]
Micah Sherr, Matt Blaze, and Boon Thau Loo. 2009. Scalable Link-Based Relay Selection for Anonymous Routing. In PETS. Springer, 73–93.
[23]
Matthew Traudt, Rob Jansen, and Aaron Johnson. 2020. FlashFlow: A Secure Speed Test for Tor. arXiv preprint arXiv:2004.09583(2020).
[24]
Tao Wang, Kevin Bauer, Clara Forero, and Ian Goldberg. 2012. Congestion-aware Path Selection for Tor. In International Conference on Financial Cryptography and Data Security. Springer, 98–113.
[25]
Xinyuan Wang, Shiping Chen, and Sushil Jajodia. 2007. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. In IEEE SP. 116–130.

Cited By

View all
  • (2024)Node Selection-Based Anonymous Network Performance Optimization Method2024 9th International Conference on Computer and Communication Systems (ICCCS)10.1109/ICCCS61882.2024.10602902(456-461)Online publication date: 19-Apr-2024
  • (2022)Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Voice CallsSN Computer Science10.1007/s42979-022-01231-93:5Online publication date: 18-Jun-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
August 2021
1447 pages
ISBN:9781450390514
DOI:10.1145/3465481
This work is licensed under a Creative Commons Attribution-NonCommercial International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 August 2021

Check for updates

Author Tags

  1. Anonymity
  2. Circuits
  3. Onion Encryption
  4. VoIP

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES 2021

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)120
  • Downloads (Last 6 weeks)26
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Node Selection-Based Anonymous Network Performance Optimization Method2024 9th International Conference on Computer and Communication Systems (ICCCS)10.1109/ICCCS61882.2024.10602902(456-461)Online publication date: 19-Apr-2024
  • (2022)Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Voice CallsSN Computer Science10.1007/s42979-022-01231-93:5Online publication date: 18-Jun-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media