DocumentCode :
705280
Title :
Path tracing in TOR networks
Author :
Johnson, Nick ; McLaughlin, Steve ; Thompson, John
Author_Institution :
Inst. for Digital Commun., Univ. of Edinburgh, Edinburgh, UK
fYear :
2010
fDate :
23-27 Aug. 2010
Firstpage :
1856
Lastpage :
1860
Abstract :
Internet based communications methods use channels which cross many nodes in their routes between source and destination. The user often has little or no control in the routing process and may be concerned that the medium is insecure. To combat this, privacy preserving networks have been developed in an attempt to allow secure, private internet-based communication. Whilst these networks employ high levels of encryption between nodes, it is possible to track a users data by correlating input and output streams. This paper addresses the implementation of the algorithm first proposed by Danezis for determining the exit node of data injected into a privacy preserving network, such as Tor. The algorithm is discussed along with some modifications and assumptions necessary for implementation. Results gained from applying the algorithm to data from a real Tor network are presented and discussed.
Keywords :
Internet; cryptography; data privacy; telecommunication network routing; Danezis; Internet based communications; TOR networks; node encryption; path tracing; privacy preserving networks; routing process; the onion router networks; Computer science; Correlation; Delays; Indexes; Internet; Privacy; Routing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signal Processing Conference, 2010 18th European
Conference_Location :
Aalborg
ISSN :
2219-5491
Type :
conf
Filename :
7096553
Link To Document :
بازگشت