Award Abstract # 1618955
TWC: Small: Efficient Traffic Analysis Resistance for Anonymity Networks

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: NORTHEASTERN UNIVERSITY
Initial Amendment Date: August 8, 2016
Latest Amendment Date: December 22, 2016
Award Number: 1618955
Award Instrument: Standard Grant
Program Manager: Phillip Regalia
pregalia@nsf.gov
 (703)292-2981
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2016
End Date: August 31, 2020 (Estimated)
Total Intended Award Amount: $499,795.00
Total Awarded Amount to Date: $507,795.00
Funds Obligated to Date: FY 2016 = $499,795.00
FY 2017 = $8,000.00
History of Investigator:
  • David Choffnes (Principal Investigator)
    choffnes@ccs.neu.edu
Recipient Sponsored Research Office: Northeastern University
360 HUNTINGTON AVE
BOSTON
MA  US  02115-5005
(617)373-5600
Sponsor Congressional District: 07
Primary Place of Performance: Northeastern University
360 Huntington Ave
Boston
MA  US  02115-5001
Primary Place of Performance
Congressional District:
07
Unique Entity Identifier (UEI): HLTMVS2JZBS6
Parent UEI:
NSF Program(s): Special Projects - CNS,
Secure &Trustworthy Cyberspace
Primary Program Source: 01001617DB NSF RESEARCH & RELATED ACTIVIT
01001718DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 7434, 7923, 9178, 9251
Program Element Code(s): 171400, 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Internet users concerned about their privacy, including whistleblowers and dissident citizens of totalitarian states, depend on reliable means to access Internet services anonymously. However, recent events publicized in popular press demonstrate that these services offer little privacy and anonymity in practice. For example, recent subpoena requiring Twitter to provide connection details of suspected Wikileaks supporters showed that governments can readily discover the network identities of Web users. To restore and promote free speech on the Internet, there is a need for systems of communication that protect users from identification through their Internet activity---even from powerful adversaries such as state actors. The proposed research will enable this through design, implementation, and deployment of anonymous communication networks that prevent eavesdroppers from identifying the source, recipient, or content of Internet communication.

Network anonymization services like Tor provide a higher degree of protection than direct communication with Web sites like Twitter, but are not designed to withstand traffic analysis (a technique that the British intelligence agency GCHQ is actively pursuing to deanonymize Tor users). While several researchers proposed designs for low-latency, traffic-analysis resistant anonymity networks, the performance of these systems was discouraging. This project will investigate anonymity network designs that are resilient to traffic analysis and that exhibit an acceptable benefit-cost ratio under some set of realistic assumptions. The project will leverage three key ideas: (i) combine trusted infrastructure (for mixing traffic) with untrusted P2P nodes (for scalability); (ii) incorporate the notion of zones to give users the ability to select the jurisdiction in which they trust their proxies to run; (iii) leverage empirically observed properties of communication workloads to develop optimized designs that provide acceptable performance/cost trade-offs. The goal is to produce networks that provide anonymity guarantees under a strong adversarial model for file sharing, Web traffic and real-time communication (VoIP), and that work for both fixed-line and mobile environments.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Muzammil Abdul Rehman, David Choffnes, Sharon Goldberg "Passport: Enabling Accurate Country-Level Router Geolocation using Inaccurate Sources" Published in ArXiv , 2019

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page