A Comparative Study on Anonymizing Networks: TOR, I۲P, and Riffle Networks Comparison

سال انتشار: 1401
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 130

فایل این مقاله در 14 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JECEI-10-2_001

تاریخ نمایه سازی: 20 تیر 1401

چکیده مقاله:

kground and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I۲P), and Riffle networks are used to communicate anonymously by different worldwide users for security, privacy, and safety requirements. Sometimes, these types of networks sacrifice anonymity for the sake of efficient communication or vice-versa. This paper surveys aforementioned networks for investigating their potential and challenges.Methods: Onion-routing networks encapsulate messages in several layers of encryption similar to layers of an onion. The anonymous communication networks are involved dining cryptographers (DC) problem so-called DC-nets, which need sending anonymous message with unconditional sender and untraceable receipt. So, DC-nets must be resistant against traffic analysis attacks although they will attenuate the network bandwidth. In this line, ToR is a free software that provides anonymous communication, I۲P networks are based on hidden internet service project which uses tunnelling for anonymous communications, and Riffle networks include a small set of camouflaging servers that provide anonymity for authorized users. This paper presents a comparative study on anonymizing ToR, I۲P, and Riffle networks in terms of associated prominent parameters in this vein.Results: The comparison is based on similarities, differences, and challenges in network behaviors. This comparison is beneficial for further researches and future improvements.Conclusion: The review of the current paper reveals that the Riffle networks are more resilient and have great confidentiality and integrity against other onion-based routing networks.

کلیدواژه ها:

نویسندگان

M. Hosseini Shirvani

Department of Computer Engineering, Sari Branch, Islamic Azad University, Sari, Iran.

A. Akbarifar

Department of Computer Engineering, Sari Branch, Islamic Azad University, Sari, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • M.S. Hosseini Shirvani, A.M. Rahmani, A. Sahafi, “An iterative mathematical ...
  • M.S. Hosseini Shirvani, “To move or not to move: An ...
  • M.S. Hosseini Shirvani, “Web Service Composition in multi-cloud environment: A ...
  • The Center for Internet Security (CIS), “The CIS Security Metrics,” ...
  • B. Conrad, F. Shirazi, “A survey on Tor and I۲P,” ...
  • D. Goldschlag, M. Reed, P. Syverson, “Onion routing for anonymous and ...
  • G.H. Owenson, N.J. Savage, “The Tor darknet,” Global Commission on ...
  • http://www.geti۲p.net[۹] https://github.com/kwonalbert/riffle[۱۰] A. Kwon, D. Lazar, S. Devadas, B. Ford, ...
  • F. Shirazi, M. Simeonovski, M.R. Asghar, “A survey on routing ...
  • B. Li, E. Erdin, M.H. Gunes, G. Bebis, T. Shipley, ...
  • E. Jardine, “The dark web dilemma: Tor, anonymity and online ...
  • P.F. Syverson, D.M. Goldschlag, M.G. Reed, "Anonymous connections and onion ...
  • Q. Yang, P. Gasti, K. Balagani, Y. Li, G. Zhou, ...
  • A. Kwon, M. AlSabah, D. Lazar, M. Dacier, S. Devadas, ...
  • R. Attarian, L. Abdi, S. Hashemi, “AdaWFPA: Adaptive online website ...
  • K. Sangeetha, K. Ravikumar, “Defense against protocol level attack in ...
  • B. Monk, J. Mitchell, R. Frank, G. Davies, “Uncovering tor: ...
  • A.S. Tanenbaum, “Distributed operating systems,” Pearson Education India, ۱۹۹۵ ...
  • M.S. Hosseini Shirvani, N. Amirsoleimani, S. Salimpour, A. Azab, “Multi-criteria ...
  • Y. Ramzanpoor, M. Hosseini Shirvani, M. Golsorkhtabaramiri, “Multi-objective fault-tolerant optimization ...
  • G. Danezis, C. Diaz, “A survey of anonymous communication channels,” ...
  • R. Dingledine, N. Mathewson, P., Syverson, “ToR: The second-generation onion ...
  • D. McCoy, k. Bauer, D. Grunwald, T. Kohno, D. Sicker, ...
  • H.Y. Huang, M. Bashir, “Who is behind the Onion? Understanding ...
  • https://geti۲p.net/en/docs/how/tech-intro ...
  • A. Crenshaw, “Common darknet weaknesses: An Overview of Attack Strategies,” ...
  • M. Wahal, T. Choudhury ”Anonymous network routing mechanism," in Proc. International ...
  • P. Mayamounkov, D.M. Eres, “Kademlia: A Peer-to-peer information system based ...
  • H. Niedermayer, “Architecture and components of secure and anonymous peer-to-peer ...
  • W. Diffie, M. Hellman, "New directions in cryptography," IEEE Trans. ...
  • M. Rouse, "What is watering hole attack?,” Retrieved March. ۲۰۱۵; ۶: ...
  • https://geti۲p.net/en/comparison/tor[۳۶] M.G. Reed, P.F. Syverson, D.M. Goldschlag, “Anonymous connections and ...
  • Z.J. Newman “A high-bandwidth, low-latency system for anonymous broadcasting,” Diss. ...
  • نمایش کامل مراجع