DocumentCode
66236
Title
The TOR data communication system
Author
Haraty, Ramzi A. ; Zantout, Bassam
Author_Institution
Dept. of Comput. Sci. & Math., Lebanese American Univ., Beirut, Lebanon
Volume
16
Issue
4
fYear
2014
fDate
Aug. 2014
Firstpage
415
Lastpage
420
Abstract
Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender´s identity, different implementations have proven successful ¿ one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity ¿ the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.
Keywords
Internet; computer network reliability; computer network security; data integrity; telecommunication network routing; telecommunication traffic; Internet; TOR data communication system; anonymous networks; critical information traversing networks; data integrity; data transfer; security standards; the onion router; traffic analysis; Bridge circuits; Cryptography; Internet; Receivers; Routing; Servers; Software; Anonymous system; data communication; security and integrity; the onion router (TOR);
fLanguage
English
Journal_Title
Communications and Networks, Journal of
Publisher
ieee
ISSN
1229-2370
Type
jour
DOI
10.1109/JCN.2014.000071
Filename
6896565
Link To Document