A Comparative Study on Anonymizing Networks: TOR, I۲P, and Riffle Networks Comparison

Publish Year: 1401
نوع سند: مقاله ژورنالی
زبان: English
View: 149

This Paper With 14 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JECEI-10-2_001

تاریخ نمایه سازی: 20 تیر 1401

Abstract:

kground and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I۲P), and Riffle networks are used to communicate anonymously by different worldwide users for security, privacy, and safety requirements. Sometimes, these types of networks sacrifice anonymity for the sake of efficient communication or vice-versa. This paper surveys aforementioned networks for investigating their potential and challenges.Methods: Onion-routing networks encapsulate messages in several layers of encryption similar to layers of an onion. The anonymous communication networks are involved dining cryptographers (DC) problem so-called DC-nets, which need sending anonymous message with unconditional sender and untraceable receipt. So, DC-nets must be resistant against traffic analysis attacks although they will attenuate the network bandwidth. In this line, ToR is a free software that provides anonymous communication, I۲P networks are based on hidden internet service project which uses tunnelling for anonymous communications, and Riffle networks include a small set of camouflaging servers that provide anonymity for authorized users. This paper presents a comparative study on anonymizing ToR, I۲P, and Riffle networks in terms of associated prominent parameters in this vein.Results: The comparison is based on similarities, differences, and challenges in network behaviors. This comparison is beneficial for further researches and future improvements.Conclusion: The review of the current paper reveals that the Riffle networks are more resilient and have great confidentiality and integrity against other onion-based routing networks.

Authors

M. Hosseini Shirvani

Department of Computer Engineering, Sari Branch, Islamic Azad University, Sari, Iran.

A. Akbarifar

Department of Computer Engineering, Sari Branch, Islamic Azad University, Sari, Iran.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • M.S. Hosseini Shirvani, A.M. Rahmani, A. Sahafi, “An iterative mathematical ...
  • M.S. Hosseini Shirvani, “To move or not to move: An ...
  • M.S. Hosseini Shirvani, “Web Service Composition in multi-cloud environment: A ...
  • The Center for Internet Security (CIS), “The CIS Security Metrics,” ...
  • B. Conrad, F. Shirazi, “A survey on Tor and I۲P,” ...
  • D. Goldschlag, M. Reed, P. Syverson, “Onion routing for anonymous and ...
  • G.H. Owenson, N.J. Savage, “The Tor darknet,” Global Commission on ...
  • http://www.geti۲p.net[۹] https://github.com/kwonalbert/riffle[۱۰] A. Kwon, D. Lazar, S. Devadas, B. Ford, ...
  • F. Shirazi, M. Simeonovski, M.R. Asghar, “A survey on routing ...
  • B. Li, E. Erdin, M.H. Gunes, G. Bebis, T. Shipley, ...
  • E. Jardine, “The dark web dilemma: Tor, anonymity and online ...
  • P.F. Syverson, D.M. Goldschlag, M.G. Reed, "Anonymous connections and onion ...
  • Q. Yang, P. Gasti, K. Balagani, Y. Li, G. Zhou, ...
  • A. Kwon, M. AlSabah, D. Lazar, M. Dacier, S. Devadas, ...
  • R. Attarian, L. Abdi, S. Hashemi, “AdaWFPA: Adaptive online website ...
  • K. Sangeetha, K. Ravikumar, “Defense against protocol level attack in ...
  • B. Monk, J. Mitchell, R. Frank, G. Davies, “Uncovering tor: ...
  • A.S. Tanenbaum, “Distributed operating systems,” Pearson Education India, ۱۹۹۵ ...
  • M.S. Hosseini Shirvani, N. Amirsoleimani, S. Salimpour, A. Azab, “Multi-criteria ...
  • Y. Ramzanpoor, M. Hosseini Shirvani, M. Golsorkhtabaramiri, “Multi-objective fault-tolerant optimization ...
  • G. Danezis, C. Diaz, “A survey of anonymous communication channels,” ...
  • R. Dingledine, N. Mathewson, P., Syverson, “ToR: The second-generation onion ...
  • D. McCoy, k. Bauer, D. Grunwald, T. Kohno, D. Sicker, ...
  • H.Y. Huang, M. Bashir, “Who is behind the Onion? Understanding ...
  • https://geti۲p.net/en/docs/how/tech-intro ...
  • A. Crenshaw, “Common darknet weaknesses: An Overview of Attack Strategies,” ...
  • M. Wahal, T. Choudhury ”Anonymous network routing mechanism," in Proc. International ...
  • P. Mayamounkov, D.M. Eres, “Kademlia: A Peer-to-peer information system based ...
  • H. Niedermayer, “Architecture and components of secure and anonymous peer-to-peer ...
  • W. Diffie, M. Hellman, "New directions in cryptography," IEEE Trans. ...
  • M. Rouse, "What is watering hole attack?,” Retrieved March. ۲۰۱۵; ۶: ...
  • https://geti۲p.net/en/comparison/tor[۳۶] M.G. Reed, P.F. Syverson, D.M. Goldschlag, “Anonymous connections and ...
  • Z.J. Newman “A high-bandwidth, low-latency system for anonymous broadcasting,” Diss. ...
  • نمایش کامل مراجع