towards anonymous communication infrastructure there are many existing anonymous communication...

11
Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most importantly – their own user base. The goal of this project is to create an infrastructure which these various solutions can be combined via a generic anonymous network protocol.

Upload: arlene-golden

Post on 18-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most

Towards Anonymous Communication Infrastructure

There are many existing anonymous communication solutions each having advantages and disadvantages

and most importantly – their own user base.

The goal of this project is to create an infrastructure which these various solutions can be combined via a

generic anonymous network protocol.

Page 2: Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most

Unified Message Structure

The first step to unify different protocols is to have a standard agreement among network traffic – in this case a unified network message structure:

Page 3: Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most

Routing Rules and Tables

Much like NAT within routers – nodes within the generic anonymous network have routing rules and

tables. This means that network data is only meaningful to its targeted node(s), and more

importantly have little to no meaning for potential attackers.

Page 4: Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most

Processors

System ProcessorsCore processors that are required to interface with and perform actions on hosted nodes:

• ReserveRPRProcessor• FinaliseRPRProcessor• RelayMessageProcessor

Guest ProcessorsGuest processors are externally written and extend the processor family. They can be downloaded on hosted nodes and executed via route rules.

• AddPublishedProcessor• AddUnPublishedProcessor

Page 5: Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most

Composite Processors

The real potential of processors is to combine separate, possibly unrelated processors, into a new short lived temporary processor – called a composite processor.

Composite processors can use any combination of system, published and unpublished processors.

Page 6: Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most

Network Unobservability

Any algorithm can be utilised on a node via the unpublished processors – this introduces a large degree of uncertainty as to how nodes behave.

Meaning that identical inputs can produce completely different and unrelated outputs.

Page 7: Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most

System Overview

Page 8: Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most

Combining User Bases

The ultimate goal is to unite different user bases to expand the anonymous community.

This doesn’t mean to re-invent the wheel – rather the opposite is proposed. Existing infrastructures have the

opportunity to join the generic network but still keep all their current users, clients and servers as is.

This is achieved by hosting nodes running published and/or unpublished processors that either implement an existing algorithm or bridge the gap between the two networks.

Page 9: Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most

Network Topologies

Page 10: Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most

Research Benefits

A large user base, existing servers and nodes act as a established network backbone. Coupled with the ability to execute

external code via unpublished processors researchers can build and experiment with new types of anonymous communication

methods.

A large problem faced by those building innovative anonymous protocols is the need to test them – and real world results are required. Previously lots of time, money and resources were needed to put together a network infrastructure to achieve this. The generic anonymous protocol solves this issue by

allowing the existing networks to be utilised.

Page 11: Towards Anonymous Communication Infrastructure There are many existing anonymous communication solutions each having advantages and disadvantages and most

Acknowledgements

Matthew Bolger – StudentShaahin Madani, Ibrahim Khalil – Supervisors