Loading [MathJax]/extensions/MathMenu.js
The TOR data communication system: A survey | IEEE Conference Publication | IEEE Xplore

The TOR data communication system: A survey


Abstract:

Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security stand...Show More

Abstract:

Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity - TOR. The paper also scrupulously presents the benefits and drawbacks of TOR.
Date of Conference: 23-26 June 2014
Date Added to IEEE Xplore: 29 September 2014
Electronic ISBN:978-1-4799-4277-0
Print ISSN: 1530-1346
Conference Location: Funchal, Portugal

I. Introduction

Onion Routing was originally prototyped by Sun Solaris 2.5.1/2.6 with implementations for web browsing, remote login, and sanitizing user information while transmitting information through data streams. The idea and further implementation of Onion Routing was based on the work of David Chaum (Chaum mixes) and further continued and enhanced by Michael G. Reed, Pal F. Syverson, and David M. Goldschlag from the US Naval Research Laboratory [1].

References

References is not available for this document.