DocumentCode :
3110116
Title :
Network Security Implementation by Onion Routing
Author :
Kaviya, K.
Author_Institution :
Sri Ramakrishna Eng. Coll., India
fYear :
2009
fDate :
16-18 Dec. 2009
Firstpage :
339
Lastpage :
342
Abstract :
Communication is the god given gift that enables intellectual and cultural exchange and builds up our competence in social behavior. The internet has taken communication to unimaginable attitudes. But many questions arise when we think of security. Is Internet communication private? Most security concerns focuses on preventing eavesdropping that is outsiders listening in on electronic conversions. But encrypted messages can still be tracked revealing who is talking to whom. This tracking is called as traffic analysis and may reveal sensitive information. As an initial step towards ensuring a secured communication we have chosen our paper as Onion Routing in LAN. Onion routing is a flexible communication infrastructure that is resistant to both eavesdropping and traffic analysis. The paper is two fold. First it securely establishes the connection. To ensure the security well known networking and Public key Cryptographc techniques are utilized. Here the identities of the sender and the receiver are hidden by an onion structure, which is cryptographically layered data structure that defines the route through the onion routing network. After the route is established by making the entries into the routing table, the data is transmitted over the channel, which is also repeatedly encrypted. Once the data is transferred the connection is destroyed. Using symmetric and asymmetric cryptosystems at different levels enhances further security. Though we have many alternative solutions such as anonymizer and crowds, Onion routing provides the efficient way of protection, which we have implemented.
Keywords :
Internet; computer network security; message authentication; public key cryptography; telecommunication network routing; Internet; LAN; asymmetric cryptosystems; communication network security implementation; encrypted message tracking; onion routing; public key cryptographc techniques; routing table; traffic analysis; Cultural differences; Data security; Global communication; Information analysis; Information security; Internet; Local area networks; Public key cryptography; Routing; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Multimedia Technology, 2009. ICIMT '09. International Conference on
Conference_Location :
Jeju Island
Print_ISBN :
978-0-7695-3922-5
Type :
conf
DOI :
10.1109/ICIMT.2009.99
Filename :
5381188
Link To Document :
بازگشت