Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

The Onion Routing: Enhancement with Tunable Path Selection

Print
PDF
IJCA Proceedings on National Conference on Advancements in Computer & Information Technology
© 2016 by IJCA Journal
NCACIT 2016 - Number 1
Year of Publication: 2016
Authors:
Ajinkya Indulkar
Javed Alam
Chinmay Raskar
Sohel Ravankole

Ajinkya Indulkar, Javed Alam, Chinmay Raskar and Sohel Ravankole. Article: The Onion Routing: Enhancement with Tunable Path Selection. IJCA Proceedings on National Conference on Advancements in Computer & Information Technology NCACIT 2016(1):1-4, May 2016. Full text available. BibTeX

@article{key:article,
	author = {Ajinkya Indulkar and Javed Alam and Chinmay Raskar and Sohel Ravankole},
	title = {Article: The Onion Routing: Enhancement with Tunable Path Selection},
	journal = {IJCA Proceedings on National Conference on Advancements in Computer & Information Technology},
	year = {2016},
	volume = {NCACIT 2016},
	number = {1},
	pages = {1-4},
	month = {May},
	note = {Full text available}
}

Abstract

The Tor anonymous network uses self-reported information measure ethics to pick out routers for building tunnels. Since tunnels square measure assigned in proportion to the current information measure, this enables a malicious router operator to ask tunnels for compromise. Though Tor bounds the self-reported information measure, it uses a high most price, effectively selecting performance over high namelessness for all users. The router alternative algorithmic rule that permits users to manage the compromise between performance and secrecy. During this associate timeserving information measure measuring algorithmic rule to exchange self-reported values that's a lot of sensitive to load and a lot of perceptive to dynamic network things. This mechanism will effectively mergers the traffic from users of various preferences, creating partitioning attacks tough. And might additionally defensible to the antecedently printed low-resource attacks on Tor.

References

  • Robin Snader and Nikita Borisov, Member, IEEE,Improving Security and Performance in the TorNetwork through Tunable Path Selection, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING.
  • K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-resource routing attacks against anonymous systems. In Proceedings of the 2007 Workshop on Privacy in the Electronic Society (WPES), 2007.
  • N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial ofservice or denial of security? How attacks on reliability can compromise anonymity. In ACM Conference on Computer and Communications Security, Oct. 2007.
  • N. Borisov and P. Golle, editors. Privacy Enhancing Technologies Symposium, volume 4776 of Lecture Notes in Computer Science, Ottawa, Canada, June 2007. Springer.
  • R. Dingledine and N. Mathewson. Anonymity loves company: Usability and the network effect. In Designing Security Systems That People Can Use. O'Reilly Media, 2005.
  • R. Dingledine, N. Mathewson, and P. Syverson. Tor: Thesecond-generation onion router. In Proceedings of the 13thUSENIX Security Symposium (USENIX Security '04), 2004.
  • M. J. Freedman and R. Morris. Tarzan: A peer-to-peeranonymizing network layer. In 9th ACM Conference onComputer and Communications Security, Washington, DC,November 2002.
  • R. Gao, C. Dovrolis, and E. W. Zegura. Avoiding oscillationsdue to intelligent route control systems. In Proceedings of the 25th IEEE International Conference on Computer Communications. (INFOCOM 2006), 2006.
  • D. Goodin. Tor at heart of embassy passwords leak. TheRegister, Sept. 10, 2007.
  • A. Kate, G. Zaverucha, and I. Goldberg. Pairing based onion routing. In Borisov and Golle
  • .