2014
DOI: 10.4304/jnw.9.9.2269-2278
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Measurement and Analysis of I2P Routers

Abstract: With the increased focus on Internet privacy, especially after the exposure of PRISM(an Internet surveillance program), anonymous communication have been getting more and more attentions. One of the most widely used anonymous communication systems is I2P(Invisible Internet Project). And as opposed to Tor's(another popular anonymous communication system) directory-based approach, which provides a centralized directory server to manage the overall 'view' of the network, I2P is fully distributed and self organizi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(22 citation statements)
references
References 2 publications
0
22
0
Order By: Relevance
“…In 2014, Liu et al [40] reported that they could observe 25,640 peers per day over a period of two weeks using various methods to discover the network topology. However, there are some issues with the methodology that the authors used to collect RouterInfos, which we will discuss in later sections.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2014, Liu et al [40] reported that they could observe 25,640 peers per day over a period of two weeks using various methods to discover the network topology. However, there are some issues with the methodology that the authors used to collect RouterInfos, which we will discuss in later sections.…”
Section: Related Workmentioning
confidence: 99%
“…While previous works intensively crawled reseed servers and floodfill routers to harvest the netDb [40], we only monitor the network in a passive manner to avoid causing any interference or unnecessarily overloading any I2P peers. I2P can be launched in a virtual network mode for studies related to testing attacks on the network [33].…”
Section: Ethical Considerationsmentioning
confidence: 99%
See 1 more Smart Citation
“…An investigation of I2P network found that approximately half of total I2P network nodes do not stay connected for longer than a week [13]. This behaviour suggests presence of large number of nodes that are running over residential DSL or mobile broadband connections, which would be unable to properly handle large number of P2P packets and therefore vulnerable to this kind of attack.…”
Section: F Locating I2p Node By Network Performancementioning
confidence: 99%
“…This paper introduces PET-Enabled Sidechain (PETES) as a new privacy enhancing technique for improving the privacy of cryptocurrency transactions by integrating the proposed PET functionality into a sidechain. Our PETES takes the advantage of both Onion Routing [10] and Garlic Routing [11] into a Garlic Onion Routing (GOR) technique.…”
Section: Introductionmentioning
confidence: 99%