As an application of privacy-enhancing technology, anonymous networks play an important role in protecting the privacy of Internet users. Different user groups have different perspectives on the need for privacy protection, but now there is a lack of a clear evaluation of each anonymous network. Some works evaluated anonymous networks, but only focused on a part of the anonymous networks metrics rather than a comprehensive evaluation that can be of great help in designing and improving anonymous networks and can also be a reference for users’ choices. Therefore, this paper proposes a set of anonymous network evaluation metrics from the perspective of developers and users, including anonymity, anti-traceability, anti-blockade, anti-eavesdropping, robustness and usability, which can complete the comprehensive evaluation of anonymous networks. For each metric, we consider different factors and give a quantitative or qualitative method to evaluate it with a score or a level. Then we apply our metrics and methods to the most popular anonymous network Tor for evaluation. Experiments show that the metrics are effective and practical.
[1]
Gerard J. Holzmann,et al.
Extracting Verification Models from Source Code
,
1999
.
[2]
Gavin Lowe,et al.
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
,
1996,
Softw. Concepts Tools.
[3]
Leslie Lamport,et al.
Proving the Correctness of Multiprocess Programs
,
1977,
IEEE Transactions on Software Engineering.
[4]
Dawson R. Engler,et al.
A few billion lines of code later
,
2010,
Commun. ACM.
[5]
Jean-Pierre Hubaux,et al.
Security and Cooperation in Wireless Networks
,
2007,
ESAS.
[6]
Shin Nakajima,et al.
The SPIN Model Checker : Primer and Reference Manual
,
2004
.
[7]
D. E. Stokes.
Pasteur's Quadrant: Basic Science and Technological Innovation
,
1997
.
[8]
Úlfar Erlingsson,et al.
Low-Level Software Security: Attacks and Defenses
,
2007,
FOSAD.
[9]
E. LESTER SMITH,et al.
AND OTHERS
,
2005
.
[10]
Riccardo Sisto,et al.
Using SPIN to Verify Security Properties of Cryptographic Protocols
,
2002,
SPIN.
[11]
Roger M. Needham,et al.
Using encryption for authentication in large networks of computers
,
1978,
CACM.