Anonymous connections and onion routing
read more
Citations
Efficient and Anonymous Online Data Collection
MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2
Anonymous routing in wireless mobile ad hoc networks to prevent location disclosure attacks
Private Computing and Mobile Code Systems
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping
References
Handbook of Applied Cryptography
Untraceable electronic mail, return addresses, and digital pseudonyms
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms.
The dining cryptographers problem: unconditional sender and recipient untraceability
Related Papers (5)
Frequently Asked Questions (10)
Q2. What future works have the authors mentioned in the paper "Anonymous connections and onion routing" ?
Besides exploring other novel applications, future work includes a system redesign to improve throughput and an implementation of reply onions [ 14 ], [ 18 ]. The authors will be implementing other mechanisms for responding to anonymous connections as well. The onion routing network supporting anonymous connections can be configured in several ways, including a firewall configuration and a customer-ISP configuration, that moves privacy to the user ’ s computer and may relieve the carrier of responsibility for the user ’ s connections.
Q3. Why is re-ordering important to the security of the system?
If re-ordering is important to the secure operation of the system, deliberate re-ordering is crucial, because low level system randomness may in fact be predictable.
Q4. Why does the network need to be able to resist traffic analysis?
Because the efficacy of mixes depends upon sufficient network traffic, allowing different applications to share the same communications infrastructure increases the ability of the network to resist traffic analysis.
Q5. What is the advantage of onion routing?
because the onion routing network can carry many types of data, it has the potential to be more heavily utilized than a network that is devoted only to e-mail.
Q6. What is the obligation of the application proxy to massage the data stream?
It is the obligation of the application proxy to massage the data stream so the onion proxy, the entry funnel, and the exit funnel can be application independent.
Q7. What is the current prototype of onion routing?
Their current prototype of onion routing considers the network topology to be static and does not have mechanisms to automatically distribute or update public keys or network topology.
Q8. What happens if the onion proxy is rejected?
If rejected, it sends an appropriate error code back to the application proxy, closes the socket, and waits for the next request.
Q9. What is the common way to send a message to the initiator?
One possibility is for the onion router on the initiator side of a break to send some large predetermined number of one bits back to the initiator followed by a message that the connection is destroyed.
Q10. What happens when the proxy sends a request to the server?
Once this request is transmitted to the server, all proxies blindly forward data in both directions between the client and the server until the socket is broken by either side.