论文标题

BlindsignedId:减轻对数字接触跟踪的拒绝服务攻击

BlindSignedID: Mitigating Denial-of-Service Attacks on Digital Contact Tracing

论文作者

Chen, Bo-Rong, Hu, Yih-Chun

论文摘要

由于最近的Covid-19爆发,许多政府暂停了户外活动,并实施了社会疏远政策,以防止SARS-COV-2传播。这些措施对经济和人们的日常生活产生了严重影响。替代广泛锁定的方法是在爆发的早期阶段有效的接触跟踪。然而,数学模型表明,使用手动接触跟踪的SARS-COV-2传播的流行病控制是难以置信的。为了减少接触追踪的努力,正在开发许多数字接触跟踪项目(例如PEPP-PT,DP-3T,TCN,BlueTrace,Google/Apple Prosposure Notification和East/West Coast Pact)正在开发以补充手动接触跟踪。但是,由于政府或其他各方可能试图使用联系跟踪方案进行大规模监视,因此数字接触跟踪对隐私倡导者进行了审查。结果,许多数字联系追踪项目建立了隐私保护机制,以限制协议泄漏的隐私信息的数量。在本文中,我们研究了这些体系结构如何抵抗某些类别的攻击,特别是DOS攻击,并呈现BlindsignedIds,这是一种具有隐私性的数字接触跟踪机制,这些机制是可验证的临时标识符,以限制MAC兼容DOS攻击的有效性。在我们的评估中,我们表明盲人可以有效地否认伪长的ephids,从而减轻对局部存储的DOS攻击,超过了90%的储存的ephids。我们的示例DOS攻击表明,使用4个攻击者可能会在正常工作时间和几天内引起千兆级的DOS攻击。

Due to the recent outbreak of COVID-19, many governments suspended outdoor activities and imposed social distancing policies to prevent the transmission of SARS-CoV-2. These measures have had severe impact on the economy and peoples' daily lives. An alternative to widespread lockdowns is effective contact tracing during an outbreak's early stage. However, mathematical models suggest that epidemic control for SARS-CoV-2 transmission with manual contact tracing is implausible. To reduce the effort of contact tracing, many digital contact tracing projects (e.g., PEPP-PT, DP-3T, TCN, BlueTrace, Google/Apple Exposure Notification, and East/West Coast PACT) are being developed to supplement manual contact tracing. However, digital contact tracing has drawn scrutiny from privacy advocates, since governments or other parties may attempt to use contact tracing protocols for mass surveillance. As a result, many digital contact tracing projects build privacy-preserving mechanisms to limit the amount of privacy-sensitive information leaked by the protocol. In this paper, we examine how these architectures resist certain classes of attacks, specifically DoS attacks, and present BlindSignedIDs, a privacy-preserving digital contact tracing mechanism, which are verifiable ephemeral identifiers to limit the effectiveness of MAC-compliant DoS attacks. In our evaluations, we showed BlindSignedID can effectively deny bogus EphIDs, mitigating DoS attacks on the local storage beyond 90% of stored EphIDs. Our example DoS attacks showed that using 4 attackers can cause the gigabyte level DoS attacks within normal working hours and days.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源