I2P Anonymous Communication Network Measurement and Analysis

  • Likun LiuEmail author
  • Hongli Zhang
  • Jiantao Shi
  • Xiangzhan Yu
  • Haixiao Xu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11910)


The I2P (Invisible Internet Project) network is a low-latency anonymous network composed of I2P routers based on garlic routing, which is mainly to protect privacy and prevent tracking, such as evading censorship and hiding whistle-blowers. As opposed to well-known and well-research Tor network, I2P aims to organize itself and distribute its anonymity. To our best knowledge, the study of I2P measurements is still insufficient. Thus, this paper proposed a novel method to measure I2P anonymous network nodes, including passive measurement and active measurement, and designed a local I2P node analysis system. Through experiments, we collected 16040 I2P nodes and analyzed properties including country distribution, bandwidth distribution and FloodingFill node attributes.


Anonymous communication network I2P Network Measurement Network security Smart Communication 



This work was supported by National Key Research & Development Plan of China under Grant 2016QY05X1000, and National Natural Science Foundation of China under Grant No.61771166.


  1. 1.
    Gai, K., Qiu, L., Chen, M., Zhao, H., Qiu, M.: SA-EAST: security-aware efficient data transmission for its in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 1–22 (2017)CrossRefGoogle Scholar
  2. 2.
    Gai, K., Qiu, M.: Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers. IEEE Trans. Ind. Inf. 14(8), 3590–3598 (2017)CrossRefGoogle Scholar
  3. 3.
    Gai, K., Qiu, M., Ming, Z., Zhao, H., Qiu, L.: Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks. IEEE Trans. Smart Grid 8(5), 2431–2439 (2017)CrossRefGoogle Scholar
  4. 4.
    Gai, K., Choo, K.K.R., Qiu, M., Zhu, L.: Privacy-preserving content-oriented wireless communication in internet-of-things. IEEE Internet Things J. 5(4), 3059–3067 (2018)CrossRefGoogle Scholar
  5. 5.
    The onion router (tor) project, official website.
  6. 6.
    Zantout, B., Haraty, R.: I2P data communication system. In: Proceedings of ICN, Citeseer, pp. 401–409 (2011)Google Scholar
  7. 7.
    Qiu, H. Noura, H. Qiu, M. Ming, Z., Memmi, G.: A user-centric data protection method for cloud storage based on invertible DWT. IEEE Transactions on Cloud Computing (2019)Google Scholar
  8. 8.
    T. I. Project.: The invisible internet project.
  9. 9.
  10. 10.
    Conrad, B., Shirazi, F.: A survey on tor and I2P. In: Ninth International Conference on Internet Monitoring and Protection (ICIMP), pp. 22–28 (2014)Google Scholar
  11. 11.
    Liu, Z., Liu, Y., Winter, P., Mittal, P., Hu, Y.C.: Torpolice: towards enforcing service-defined access policies for anonymous communication in the tor network. In: 2017 IEEE 25th International Conference on Network Protocols (ICNP), pp. 1–10 (2017)Google Scholar
  12. 12.
    Liu, P., Wang, L., Tan, Q., Li, Q., Wang, X., Shi, J.: Empirical measurement and analysis of I2P routers. J. Netw. 9(9), 2269–2279 (2014)Google Scholar
  13. 13.
    Zincir-Heywood, K.S.A.N.: Weighted factors for measuring anonymity services: a case study on tor, jondonym, and I2PGoogle Scholar
  14. 14.
    Shahbar, K., Zincir-Heywood, A.N.: Effects of shared bandwidth on anonymity of the I2P network users. In: 2017 IEEE Security and Privacy Workshops (SPW), pp. 235–240 (2017)Google Scholar
  15. 15.
    Ye, L., Yu, X., Zhao, J., Zhan, D., Du, X., Guizani, M.: Deciding your own anonymity: user-oriented node selection in I2P. In: IEEE Access, vol. 6, pp. 71350–71359 (2018)CrossRefGoogle Scholar
  16. 16.
    Hoang, N.P., Kintis, P., Antonakakis, M., Polychronakis, M.: An empirical study of the I2P anonymity network and its censorship resistance. In: Proceedings of the Internet Measurement Conference (IMC), pp. 379–392 (2018)Google Scholar
  17. 17.
    Timpanaro, J.P., Isabelle, C., Olivier, F.: Monitoring the I2P network. Ph.D. dissertation, Inria (2011)Google Scholar
  18. 18.
    Herrmann, M., Grothoff, C.: Privacy-implications of performance-based peer selection by onion-routers: a real-world case study using I2P. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 155–174. Springer, Heidelberg (2011). Scholar
  19. 19.
    Yang, Q., Gasti, P., Balagani, K., Li, Y., Gang, Z.: Usb side-channel attack on tor. Comput. Netw. 141, 57–66 (2018)CrossRefGoogle Scholar
  20. 20.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Likun Liu
    • 1
    Email author
  • Hongli Zhang
    • 1
  • Jiantao Shi
    • 1
  • Xiangzhan Yu
    • 1
  • Haixiao Xu
    • 2
  1. 1.Harbin Institute of TechnologyHarbin HRBChina
  2. 2.Jilin UniversityChangchun CCChina

Personalised recommendations