Filters








1,674 Hits in 4.7 sec

On Building Onion Routing into Future Internet Architectures [chapter]

Daniele E. Asoni, Chen Chen, David Barrera, Adrian Perrig
2016 Lecture Notes in Computer Science  
Research initiatives around future Internet architectures (FIAs) offer a unique opportunity to integrate privacy protection measures into the architecture of the network itself.  ...  User privacy on the Internet has become a pressing concern in recent years largely due to the revelations of large scale network surveillance programs.  ...  Conclusion This paper has given an overview of the design considerations, trade-offs, and challenges in deploying onion routing anonymity systems on future Internet architectures.  ... 
doi:10.1007/978-3-319-39028-4_6 fatcat:h6ove4ae5nfvbkips6hxw22asi

Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks

Olaf Landsiedel, Alexis Pimenidis, Klaus Wehrle, Heiko Niedermayer, Georg Carle
2007 IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference  
Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing.  ...  In Onion Routing a static tunnel through an overlay network is build via layered encryption. All traffic exchanged by its end points is relayed through this tunnel.  ...  FUTURE WORK AND CONCLUSION In this paper, we present a novel approach to anonymous Internet communication: dynamic multipath Onion Routing.  ... 
doi:10.1109/glocom.2007.20 dblp:conf/globecom/LandsiedelPWNC07 fatcat:2adud7npxjaotgg5zmhewdsmee

Private Web browsing

Paul F. Syverson, Michael G. Reed, David M. Goldschlag
1997 Journal of Computer Security  
These anonymous connections are versatile and support private use of many di erent Internet services.  ...  Figure 2 is an onion that the initiator's proxy living on onion router W would create to build a route to the responder's proxy living on onion router Z through onion routers X and Y .  ...  There are two classes of proxies: one that makes connections from initiating applications into the onion routing network, and the other that completes the connection from the onion routing network to responders  ... 
doi:10.3233/jcs-1997-5305 fatcat:auatngdqnngqpcytqitjrevelq

Tor instead of IP

Vincent Liu, Seungyeop Han, Arvind Krishnamurthy, Thomas Anderson
2011 Proceedings of the 10th ACM Workshop on Hot Topics in Networks - HotNets '11  
In this paper, we take a fresh approach: instead of running Tor on top of IP, we propose to run Tor instead of IP.  ...  We ask: what might the Internet look like if privacy and censorship resistance had been designed in from scratch?  ...  Over the years, many attempts have been made to define a security architecture for the Internet.  ... 
doi:10.1145/2070562.2070576 dblp:conf/hotnets/LiuHKA11 fatcat:xtyura32xvdb3mw6od72bprqaa

Cloudless Wide Area Friend-to-Friend Networking Middleware for Smartphones

Jo Inge Arnes, Randi Karlsen
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
The middleware fits into the friend-to-friend subcategory of peer-to-peer systems, meaning that the overlay network is built on top of already existing trust relationships among its users.  ...  Swirlwave is a middleware that enables peer-to-peer and distributed computing for Internet-connected devices that lack publicly reachable Internet Protocol (IP) addresses, that can be expected to disconnect  ...  MOBILE PEER-TO-PEER COMMUNICATION WITHOUT PUBLIC IP ADDRESS This section describes the architecture for Swirlwave and how it builds on Tor and the Tor Onion Service protocol 6 .  ... 
doi:10.5220/0006830104210430 dblp:conf/icete/ArnesK18 fatcat:4gduvs4kibaxpnhwndr2dpytsu

Performance analysis of a Tor-like onion routing implementation [article]

Quinten Stokkink, Harmjan Treep, Johan Pouwelse
2015 arXiv   pre-print
The current onion routing implementation of Tribler works as expected but throttles the overall throughput of the Tribler system.  ...  Our work has been integrated into the Tribler eco-system.  ...  This is also called onion routing.  ... 
arXiv:1507.00245v1 fatcat:cd4nata5rnhdjdtvs5whhijmhy

A peel of onion

Paul Syverson
2011 Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC '11  
on any given day.  ...  Onion routing was invented more than fifteen years ago to separate identification from routing in network communication.  ...  Another important change to Freedom in the 2.0 architecture was to change to two hops for circuits to the Internet [2] .  ... 
doi:10.1145/2076732.2076750 dblp:conf/acsac/Syverson11 fatcat:aef6ruhlaveabnsh322vfekydq

The NEBULA Future Internet Architecture [chapter]

Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo (+8 others)
2013 Lecture Notes in Computer Science  
Introduction The NEBULA Future Internet Architecture (FIA) project is focused on a future network that enables the vision of cloud computing [8, 12] to be realized.  ...  Conclusions NEBULA is a Future Internet Architecture intended to provide secure and resilient networking to support present and future applications of cloud computing.  ... 
doi:10.1007/978-3-642-38082-2_2 fatcat:ytfmllm6yjeazgw4n73cq3x3ke

IPsec-Based Anonymous Networking: A Working Implementation

C. Kiraly, R. L. Cigno
2009 2009 IEEE International Conference on Communications  
Protecting users' privacy is becoming one of the rising issues for the success of future communications.  ...  The Internet in particular, with its open architecture, presents several threats to the right of protecting personal and sensitive data.  ...  Technically, these principles are realized using onion encapsulation (see Fig. 2 ), i.e., embedding one encrypted layer into another recursively.  ... 
doi:10.1109/icc.2009.5199102 dblp:conf/icc/KiralyC09 fatcat:p6n5u4snbff55ojxfo5w4toqpm

A survey on the design, applications, and enhancements of application-layer overlay networks

Jinu Kurian, Kamil Sarac
2010 ACM Computing Surveys  
layers in the Internet.  ...  We conclude the article with a comment on the purist vs pluralist argument of overlay networks that has received much debate recently.  ...  The pluralist vs purist views of overlay deployment offer an intriguing perspective into the future model of Internet deployment.  ... 
doi:10.1145/1824795.1824800 fatcat:2fxn5s3l2rc4xmtzfvk7oshzxi

Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput

Steven Engler, Ian Goldberg
2021 The 16th International Conference on Availability, Reliability and Security  
His insight into privacy-enhancing technologies, such as Tor, was invaluable and I have learned much from it.  ...  I would also like to thank my committee members, Urs Hengartner and Ali Mashtizadeh, for their comments and feedback on this thesis.  ...  Chapter 2 Tor and Onion Routing As Internet routing requires every packet to identify its sender and receiver, any router along the path of this packet can easily identify which Internet addresses are  ... 
doi:10.1145/3465481.3465745 fatcat:5klby3msvzehrpx67reot3ll4e

Code Analysis and Improvement of Onion Routing Anonymous Systems

Tianbo Lu, Youwen Wang, Lingling Zhao, Yang Lin
2016 International Journal of Future Generation Communication and Networking  
Tor is the most popular anonymous communication system currently, which is based on technology of the second-generation onion routing.  ...  , the onion routing system arises at the historic moment.  ...  Circuit Building Process In order to balance the anonymity and cost, OP choose three routing nodes constitute a circuit.  ... 
doi:10.14257/ijfgcn.2016.9.8.33 fatcat:znpktjuzxfhm7mbonc3yy7z56y

Cloudless Friend-to-Friend Middleware for Smartphones [chapter]

Jo Inge Arnes, Randi Karlsen
2019 Communications in Computer and Information Science  
Using smartphones for peer-to-peer communication over the Internet is difficult without the aid of centralized services.  ...  Also, because people carry their smartphones with them, smartphones will often disconnect from one network and connect to another. Smartphones can also go offline.  ...  Swirlwave uses onion addresses to connect to peers. Routing is still dependent on IP addresses under the hood, just as with all Internet traffic.  ... 
doi:10.1007/978-3-030-34866-3_10 fatcat:yjnxhfer7fep7e4htsqqnr43v4

Anonymous connections and onion routing

M.G. Reed, P.F. Syverson, D.M. Goldschlag
1998 IEEE Journal on Selected Areas in Communications  
This paper also describes several application proxies for onion routing, as well as configurations of onion routing networks.  ...  A prototype onion routing network is running between our lab and other sites. This paper describes anonymous connections and their implementation using onion routing.  ...  They also thank the anonymous referees, the Levien family for hosting the onion dinner, and the Isaac Newton Institute for hosting one of the authors while some of this work was done.  ... 
doi:10.1109/49.668972 fatcat:ddgkhaakwnfijbw5bdztvbjm44

Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network

Ben Collier, James Stewart
2021 Science, Technology and Human Values  
By following Tor's design and development we show a privacy world emerging—one centered on a construction of privacy understood through the topology of structural power in the Internet backbone.  ...  discourse renders privacy as a problem that can be "solved" through engineering, allowing the translation and representation of different groups of imagined users, adversaries, and technical aspects of the Internet  ...  We would additionally like to thank Jamie Buchan and other colleagues who provided comments on the draft, particularly at STIS in Edinburgh and at the Cambridge Cybercrime Centre.  ... 
doi:10.1177/01622439211039019 fatcat:4jc2t6c6s5be7kxqln23ycyzjq
« Previous Showing results 1 — 15 out of 1,674 results