Review Article

A Survey of Key Technologies for Constructing Network Covert Channel

Table 4

The anonymous communication systems.

SystemLow latencyP2P networkStructured networkMain techniquesApplication scenarios

Mix [65](i) Mix-net(i) e-mail

DC-Nets [71](i) Broadcast/multicast(i) Anonymously post messages

Tor [23](i) Onion routing
(ii) Tunneling tool: meek
(iii) Protocol mimicry tool: StegoTorus and SkypeMorch
(iv) Randomization tool: Obfs, dust etc
(v) Anonymous domain generation
(i) Anonymously web browsing
(ii) Live chat

P5 [67](i) Mix-net
(ii) Join dummy traffic
(iii) Broadcast/multicast
(i) Anonymous web transactions
(ii) Anonymous re-mailers

Crowds [66](i) Mix-net
(ii) Probabilistic traffic routing mechanism
(i) Anonymously web browsing

Torsk [72](i) Mix-net
(ii) DHT-based routing protocols
(i) Anonymously web browsing
(ii) Live chat

BitBlender [73](i) Mix-net
(ii) DHT-based routing protocols
(i) Bitcoin mixer

Anonymizer [83](i) Mix-net(i) Anonymously web browsing
(ii) Anonymous e-mail services

Mixminion [84](i) Mix-net
(ii) Anonymous domain generation
(i) Anonymous e-mail services

Babel [83](i) Mix-net(i) Anonymous e-mail services

I2P [24](i) Garlic routing (a variant of onion routing)
(ii) Anonymous domain generation
(i) Anonymously web browsing
(ii) File transfer
(iii) Instant messaging

Atom [8](i) Mix-net
(ii) Zero knowledge proofs
(i) Communication bootstrapping
(ii) Microblogging application

Riffle [70](i) Onion routing
(ii) Verifiable shuffle technique
(i) File sharing
(ii) Microblogging applications

Loopix [11](i) Mix-net
(ii) Join dummy traffic (loop traffic created by users and mix servers)
(i) Private e-mail
(ii) Instant messaging