CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

The Onion Routing: Enhancement with Tunable Path Selection

Published on May 2016 by Ajinkya Indulkar, Javed Alam, Chinmay Raskar, Sohel Ravankole
National Conference on Advancements in Computer & Information Technology
Foundation of Computer Science USA
NCACIT2016 - Number 1
May 2016
Authors: Ajinkya Indulkar, Javed Alam, Chinmay Raskar, Sohel Ravankole
eb4ce847-dc29-483f-8d13-9102571eeabc

Ajinkya Indulkar, Javed Alam, Chinmay Raskar, Sohel Ravankole . The Onion Routing: Enhancement with Tunable Path Selection. National Conference on Advancements in Computer & Information Technology. NCACIT2016, 1 (May 2016), 1-4.

@article{
author = { Ajinkya Indulkar, Javed Alam, Chinmay Raskar, Sohel Ravankole },
title = { The Onion Routing: Enhancement with Tunable Path Selection },
journal = { National Conference on Advancements in Computer & Information Technology },
issue_date = { May 2016 },
volume = { NCACIT2016 },
number = { 1 },
month = { May },
year = { 2016 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/ncacit2016/number1/24695-3026/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advancements in Computer & Information Technology
%A Ajinkya Indulkar
%A Javed Alam
%A Chinmay Raskar
%A Sohel Ravankole
%T The Onion Routing: Enhancement with Tunable Path Selection
%J National Conference on Advancements in Computer & Information Technology
%@ 0975-8887
%V NCACIT2016
%N 1
%P 1-4
%D 2016
%I International Journal of Computer Applications
Abstract

The Tor anonymous network uses self-reported information measure ethics to pick out routers for building tunnels. Since tunnels square measure assigned in proportion to the current information measure, this enables a malicious router operator to ask tunnels for compromise. Though Tor bounds the self-reported information measure, it uses a high most price, effectively selecting performance over high namelessness for all users. The router alternative algorithmic rule that permits users to manage the compromise between performance and secrecy. During this associate timeserving information measure measuring algorithmic rule to exchange self-reported values that's a lot of sensitive to load and a lot of perceptive to dynamic network things. This mechanism will effectively mergers the traffic from users of various preferences, creating partitioning attacks tough. And might additionally defensible to the antecedently printed low-resource attacks on Tor.

References
  1. Robin Snader and Nikita Borisov, Member, IEEE,Improving Security and Performance in the TorNetwork through Tunable Path Selection, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING.
  2. K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-resource routing attacks against anonymous systems. In Proceedings of the 2007 Workshop on Privacy in the Electronic Society (WPES), 2007.
  3. N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial ofservice or denial of security? How attacks on reliability can compromise anonymity. In ACM Conference on Computer and Communications Security, Oct. 2007.
  4. N. Borisov and P. Golle, editors. Privacy Enhancing Technologies Symposium, volume 4776 of Lecture Notes in Computer Science, Ottawa, Canada, June 2007. Springer.
  5. R. Dingledine and N. Mathewson. Anonymity loves company: Usability and the network effect. In Designing Security Systems That People Can Use. O'Reilly Media, 2005.
  6. R. Dingledine, N. Mathewson, and P. Syverson. Tor: Thesecond-generation onion router. In Proceedings of the 13thUSENIX Security Symposium (USENIX Security '04), 2004.
  7. M. J. Freedman and R. Morris. Tarzan: A peer-to-peeranonymizing network layer. In 9th ACM Conference onComputer and Communications Security, Washington, DC,November 2002.
  8. R. Gao, C. Dovrolis, and E. W. Zegura. Avoiding oscillationsdue to intelligent route control systems. In Proceedings of the 25th IEEE International Conference on Computer Communications. (INFOCOM 2006), 2006.
  9. D. Goodin. Tor at heart of embassy passwords leak. TheRegister, Sept. 10, 2007.
  10. A. Kate, G. Zaverucha, and I. Goldberg. Pairing based onion routing. In Borisov and Golle
  11. .
Index Terms

Computer Science
Information Sciences

Keywords

Tor Security Privacy anonymous Communication Traffic Analysis Path Choice Information Measure Estimation.