Alibi Routing

There are several mechanisms by which users can gain insight into where their packets have gone, but no mechanisms allow users undeniable proof that their packets did not traverse certain parts of the world while on their way to or from another host. This paper introduces the problem of finding &quo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer communication review 2015-09, Vol.45 (4), p.611-624
Hauptverfasser: Levin, Dave, Lee, Youndo, Valenta, Luke, Li, Zhihao, Lai, Victoria, Lumezanu, Cristian, Spring, Neil, Bhattacharjee, Bobby
Format: Magazinearticle
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 624
container_issue 4
container_start_page 611
container_title Computer communication review
container_volume 45
creator Levin, Dave
Lee, Youndo
Valenta, Luke
Li, Zhihao
Lai, Victoria
Lumezanu, Cristian
Spring, Neil
Bhattacharjee, Bobby
description There are several mechanisms by which users can gain insight into where their packets have gone, but no mechanisms allow users undeniable proof that their packets did not traverse certain parts of the world while on their way to or from another host. This paper introduces the problem of finding "proofs of avoidance": evidence that the paths taken by a packet and its response avoided a user-specified set of "forbidden" geographic regions. Proving that something did not happen is often intractable, but we demonstrate a low-overhead proof structure built around the idea of what we call "alibis": relays with particular timing constraints that, when upheld, would make it impossible to traverse both the relay and the forbidden regions. We present Alibi Routing, a peer-to-peer overlay routing system for finding alibis securely and efficiently. One of the primary distinguishing characteristics of Alibi Routing is that it does not require knowledge of--or modifications to--the Internet's routing hardware or policies. Rather, Alibi Routing is able to derive its proofs of avoidance from user-provided GPS coordinates and speed of light propagation delays. Using a PlanetLab deployment and larger-scale simulations, we evaluate Alibi Routing to demonstrate that many source-destination pairs can avoid countries of their choosing with little latency inflation. We also identify when Alibi Routing does not work: it has difficulty avoiding regions that users are very close to (or, of course, inside of).
doi_str_mv 10.1145/2829988.2787509
format Magazinearticle
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_1145_2829988_2787509</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1145_2829988_2787509</sourcerecordid><originalsourceid>FETCH-LOGICAL-c171t-95fc0bd7a5c3cda264953ce9452040c7a5448a269973c9f4469cf46b3b4ade013</originalsourceid><addsrcrecordid>eNotz01rAjEQxvEcWvClnnv1C6zOJJNN5ijSakEQpJ5DdnZTVqzKxh789lXc0wP_wwM_pd4RZohk59prZu9n2nlngV_UEJDKgrwxAzXK-QCAHi0N1WRxbKt2ujv_XdvTz5t6TfGYm0m_Y7X__PherovNdvW1XGwKQYfXgm0SqGoXrRipoy6JrZGGyWogkHsn8vfM7IxwIipZEpWVqSjWDaAZq_nzV7pzzl2TwqVrf2N3CwjhIQi9IPQC8w-2qThM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype></control><display><type>magazinearticle</type><title>Alibi Routing</title><source>ACM Digital Library Complete</source><creator>Levin, Dave ; Lee, Youndo ; Valenta, Luke ; Li, Zhihao ; Lai, Victoria ; Lumezanu, Cristian ; Spring, Neil ; Bhattacharjee, Bobby</creator><creatorcontrib>Levin, Dave ; Lee, Youndo ; Valenta, Luke ; Li, Zhihao ; Lai, Victoria ; Lumezanu, Cristian ; Spring, Neil ; Bhattacharjee, Bobby</creatorcontrib><description>There are several mechanisms by which users can gain insight into where their packets have gone, but no mechanisms allow users undeniable proof that their packets did not traverse certain parts of the world while on their way to or from another host. This paper introduces the problem of finding "proofs of avoidance": evidence that the paths taken by a packet and its response avoided a user-specified set of "forbidden" geographic regions. Proving that something did not happen is often intractable, but we demonstrate a low-overhead proof structure built around the idea of what we call "alibis": relays with particular timing constraints that, when upheld, would make it impossible to traverse both the relay and the forbidden regions. We present Alibi Routing, a peer-to-peer overlay routing system for finding alibis securely and efficiently. One of the primary distinguishing characteristics of Alibi Routing is that it does not require knowledge of--or modifications to--the Internet's routing hardware or policies. Rather, Alibi Routing is able to derive its proofs of avoidance from user-provided GPS coordinates and speed of light propagation delays. Using a PlanetLab deployment and larger-scale simulations, we evaluate Alibi Routing to demonstrate that many source-destination pairs can avoid countries of their choosing with little latency inflation. We also identify when Alibi Routing does not work: it has difficulty avoiding regions that users are very close to (or, of course, inside of).</description><identifier>ISSN: 0146-4833</identifier><identifier>DOI: 10.1145/2829988.2787509</identifier><language>eng</language><ispartof>Computer communication review, 2015-09, Vol.45 (4), p.611-624</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c171t-95fc0bd7a5c3cda264953ce9452040c7a5448a269973c9f4469cf46b3b4ade013</citedby><cites>FETCH-LOGICAL-c171t-95fc0bd7a5c3cda264953ce9452040c7a5448a269973c9f4469cf46b3b4ade013</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776,780,27904</link.rule.ids></links><search><creatorcontrib>Levin, Dave</creatorcontrib><creatorcontrib>Lee, Youndo</creatorcontrib><creatorcontrib>Valenta, Luke</creatorcontrib><creatorcontrib>Li, Zhihao</creatorcontrib><creatorcontrib>Lai, Victoria</creatorcontrib><creatorcontrib>Lumezanu, Cristian</creatorcontrib><creatorcontrib>Spring, Neil</creatorcontrib><creatorcontrib>Bhattacharjee, Bobby</creatorcontrib><title>Alibi Routing</title><title>Computer communication review</title><description>There are several mechanisms by which users can gain insight into where their packets have gone, but no mechanisms allow users undeniable proof that their packets did not traverse certain parts of the world while on their way to or from another host. This paper introduces the problem of finding "proofs of avoidance": evidence that the paths taken by a packet and its response avoided a user-specified set of "forbidden" geographic regions. Proving that something did not happen is often intractable, but we demonstrate a low-overhead proof structure built around the idea of what we call "alibis": relays with particular timing constraints that, when upheld, would make it impossible to traverse both the relay and the forbidden regions. We present Alibi Routing, a peer-to-peer overlay routing system for finding alibis securely and efficiently. One of the primary distinguishing characteristics of Alibi Routing is that it does not require knowledge of--or modifications to--the Internet's routing hardware or policies. Rather, Alibi Routing is able to derive its proofs of avoidance from user-provided GPS coordinates and speed of light propagation delays. Using a PlanetLab deployment and larger-scale simulations, we evaluate Alibi Routing to demonstrate that many source-destination pairs can avoid countries of their choosing with little latency inflation. We also identify when Alibi Routing does not work: it has difficulty avoiding regions that users are very close to (or, of course, inside of).</description><issn>0146-4833</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2015</creationdate><recordtype>magazinearticle</recordtype><recordid>eNotz01rAjEQxvEcWvClnnv1C6zOJJNN5ijSakEQpJ5DdnZTVqzKxh789lXc0wP_wwM_pd4RZohk59prZu9n2nlngV_UEJDKgrwxAzXK-QCAHi0N1WRxbKt2ujv_XdvTz5t6TfGYm0m_Y7X__PherovNdvW1XGwKQYfXgm0SqGoXrRipoy6JrZGGyWogkHsn8vfM7IxwIipZEpWVqSjWDaAZq_nzV7pzzl2TwqVrf2N3CwjhIQi9IPQC8w-2qThM</recordid><startdate>20150922</startdate><enddate>20150922</enddate><creator>Levin, Dave</creator><creator>Lee, Youndo</creator><creator>Valenta, Luke</creator><creator>Li, Zhihao</creator><creator>Lai, Victoria</creator><creator>Lumezanu, Cristian</creator><creator>Spring, Neil</creator><creator>Bhattacharjee, Bobby</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20150922</creationdate><title>Alibi Routing</title><author>Levin, Dave ; Lee, Youndo ; Valenta, Luke ; Li, Zhihao ; Lai, Victoria ; Lumezanu, Cristian ; Spring, Neil ; Bhattacharjee, Bobby</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c171t-95fc0bd7a5c3cda264953ce9452040c7a5448a269973c9f4469cf46b3b4ade013</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2015</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Levin, Dave</creatorcontrib><creatorcontrib>Lee, Youndo</creatorcontrib><creatorcontrib>Valenta, Luke</creatorcontrib><creatorcontrib>Li, Zhihao</creatorcontrib><creatorcontrib>Lai, Victoria</creatorcontrib><creatorcontrib>Lumezanu, Cristian</creatorcontrib><creatorcontrib>Spring, Neil</creatorcontrib><creatorcontrib>Bhattacharjee, Bobby</creatorcontrib><collection>CrossRef</collection><jtitle>Computer communication review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Levin, Dave</au><au>Lee, Youndo</au><au>Valenta, Luke</au><au>Li, Zhihao</au><au>Lai, Victoria</au><au>Lumezanu, Cristian</au><au>Spring, Neil</au><au>Bhattacharjee, Bobby</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Alibi Routing</atitle><jtitle>Computer communication review</jtitle><date>2015-09-22</date><risdate>2015</risdate><volume>45</volume><issue>4</issue><spage>611</spage><epage>624</epage><pages>611-624</pages><issn>0146-4833</issn><abstract>There are several mechanisms by which users can gain insight into where their packets have gone, but no mechanisms allow users undeniable proof that their packets did not traverse certain parts of the world while on their way to or from another host. This paper introduces the problem of finding "proofs of avoidance": evidence that the paths taken by a packet and its response avoided a user-specified set of "forbidden" geographic regions. Proving that something did not happen is often intractable, but we demonstrate a low-overhead proof structure built around the idea of what we call "alibis": relays with particular timing constraints that, when upheld, would make it impossible to traverse both the relay and the forbidden regions. We present Alibi Routing, a peer-to-peer overlay routing system for finding alibis securely and efficiently. One of the primary distinguishing characteristics of Alibi Routing is that it does not require knowledge of--or modifications to--the Internet's routing hardware or policies. Rather, Alibi Routing is able to derive its proofs of avoidance from user-provided GPS coordinates and speed of light propagation delays. Using a PlanetLab deployment and larger-scale simulations, we evaluate Alibi Routing to demonstrate that many source-destination pairs can avoid countries of their choosing with little latency inflation. We also identify when Alibi Routing does not work: it has difficulty avoiding regions that users are very close to (or, of course, inside of).</abstract><doi>10.1145/2829988.2787509</doi><tpages>14</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0146-4833
ispartof Computer communication review, 2015-09, Vol.45 (4), p.611-624
issn 0146-4833
language eng
recordid cdi_crossref_primary_10_1145_2829988_2787509
source ACM Digital Library Complete
title Alibi Routing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T11%3A36%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Alibi%20Routing&rft.jtitle=Computer%20communication%20review&rft.au=Levin,%20Dave&rft.date=2015-09-22&rft.volume=45&rft.issue=4&rft.spage=611&rft.epage=624&rft.pages=611-624&rft.issn=0146-4833&rft_id=info:doi/10.1145/2829988.2787509&rft_dat=%3Ccrossref%3E10_1145_2829988_2787509%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true