Platform for Teaching Hands-on End-to-End Anonymity Algorithms

被引:0
|
作者
Salib, Emil H. [1 ]
Hobar, Grant [1 ]
机构
[1] James Madison Univ, Coll Integrated Sci & Engn, Harrisonburg, VA 22807 USA
关键词
onion routing; Tor; curriculum; teaching method; undergraduate course; anonymity; consensus;
D O I
暂无
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
This full paper presents an innovative approach in teaching anonymity algorithms. Teaching end-to-end anonymity algorithms, such as onion routing, has been a challenging task. This is primarily because of the inaccessibility of all the components that make up the end-to-end anonymity network. For example, an onion is the data structure formed by "wrapping" a message with successive layers of encryption to be decrypted by as many intermediary computers as there are layers before arriving at its destination. The intent of the onion routing algorithms is to protect the privacy of its users as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored. In recent years, community research, specifically at the university level, into onion routing has ground to a halt and the limited resources for establishing private testing networks have fallen into a derelict state. The proposed solution is an elaborate walk-through, detailing the construction of an isolated onion routing network in which onion routing can be observed and verified in a controlled environment. Achieving this will require the configuration of several Directory Authorities, multiple nodes configured as Entry, Middle, and Exit relays, and the generation of a consensus. Once the consensus has been generated, the network will be able to build circuits across the nodes and fulfill the client's requests for information. When a packet capturing tool is applied to the various entities, the life of the packet as it traverses the network will be observed. The product of this endeavor was the creation of a complete virtual environment and detailed documentation of the steps necessary to construct a private onion routing network that can be readily utilized by educators and students to teach and learn the innerworkings of the OR algorithms. Constructing an isolated OR network, where all the network traffic is observable, is an essential first step in peeling back the next layer of onion routing.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] End-to-End Data Science with SAS: A Hands-On Programming Guide
    Khattree, Ravi
    [J]. INTERNATIONAL STATISTICAL REVIEW, 2020, 88 (03) : 809 - 812
  • [2] End-to-End Data Science with SAS: A Hands-On Programming Guide
    Khattree, Ravi
    [J]. INTERNATIONAL STATISTICAL REVIEW, 2020,
  • [3] Hands-on Undergraduate Labs on Anonymity Cryptographic Algorithms
    Salib, Emil H.
    Aboutabl, Mohamed S.
    [J]. 2020 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE 2020), 2020,
  • [4] Simplifying Hands-On Teaching of Distributed Algorithms with SPLAY
    Riviere, Etienne
    [J]. 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1311 - 1316
  • [5] An End-to-End Mobile Platform for Pervasive Healthcare
    Gangopadhyay, Ranjan
    [J]. 2012 5TH INTERNATIONAL CONFERENCE ON COMPUTERS AND DEVICES FOR COMMUNICATION (CODEC), 2012,
  • [6] EverySense: An end-to-end IoT market platform
    Mano, Hiroshi
    [J]. ADJUNCT PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING NETWORKING AND SERVICES (MOBIQUITOUS 2016), 2016, : 1 - 5
  • [7] On routing algorithms with end-to-end delay guarantees
    Rao, NSV
    Batsell, SG
    [J]. 7TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS - PROCEEDINGS, 1998, : 162 - 167
  • [8] End-to-End Detection and Pose Estimation of Two Interacting Hands
    Kim, Dong Uk
    Kim, Kwang In
    Baek, Seungryul
    [J]. 2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 11169 - 11178
  • [9] Looper: An End-to-end ML Platform for Product Decisions
    Markov, Igor L.
    Wang, Hanson
    Kasturi, Nitya S.
    Singh, Shaun
    Garrard, Mia R.
    Huang, Yin
    Yuen, Sze Wai
    Tran, Sarah
    Wang, Zehui
    Glotov, Igor
    Gupta, Tanvi
    Chen, Peng
    Huang, Boshuang
    Xie, Xiaowen
    Belkin, Michael
    Uryasev, Sal
    Howie, Sam
    Bakshy, Eytan
    Zhou, Norm
    [J]. PROCEEDINGS OF THE 28TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2022, 2022, : 3513 - 3523
  • [10] Analyzing End-to-End Functional Delays on an IMA Platform
    Lauer, Michael
    Ermont, Jerome
    Pagetti, Claire
    Boniol, Frederic
    [J]. LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION, AND VALIDATION, PT I, 2010, 6415 : 243 - +