An Improved Tor Circuit-Building Protocol

被引:0
|
作者
Liu, Xin [1 ]
Wang, Neng [1 ]
机构
[1] E China Normal Univ, Dept Comp Sci & Technol, Shanghai 200062, Peoples R China
关键词
Tor; Anonymity; Improved Circuit-Building Protocol;
D O I
10.1109/JCAI.2009.27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Tor is the second generation Onion Router, supporting the anonymous transport of TCP streams over the Internet. Its low latency makes it very suitable for common Internet communication applications. So Tor has become the most successful public anonymity communication service in the Internet. In this paper, we investigate Tor current Circuit-Building Protocol. We found some performance and user experience deficiencies in this protocol. Based on the investigation we propose Improved Circuit-Building Protocol. The protocol includes two phases: user-selectable relay node selection and circuit construction. In the new protocol, we propose three new algorithms: user-selectable relay node selection algorithm, fast circuit constructing algorithm and backup circuit algorithm. In addition we also present an evaluation to the new protocol in terms of user experience, performance and anonymity. Through our evaluation, we think with our Improved Circuit-Building Protocol, we can provide better user experience, better performance and the same anonymity with current Circuit-Building Protocol to Tor users.
引用
收藏
页码:671 / 675
页数:5
相关论文
共 50 条
  • [1] An Automated Deductive Verification Framework for Circuit-building Quantum Programs
    Chareton, Christophe
    Bardin, Sebastien
    Bobot, Francois
    Perrelle, Valentin
    Valiron, Benoit
    PROGRAMMING LANGUAGES AND SYSTEMS, ESOP 2021, 2021, 12648 : 148 - 177
  • [2] An Improved Algorithm for Tor Circuit Scheduling
    Tang, Can
    Goldberg, Ian
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 329 - 339
  • [3] Building Incentives into Tor
    Ngan, Tsuen-Wan 'Johnny'
    Dingledine, Roger
    Wallach, Dan S.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 238 - +
  • [4] Evaluation of Circuit Lifetimes in Tor
    Koster, Kevin
    Marx, Matthias
    Kunstmann, Anne
    Federrath, Hannes
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (SEC 2022), 2022, 648 : 142 - 157
  • [5] On the security of the Tor authentication protocol
    Goldberg, Ian
    Privacy Enhancing Technologies, 2006, 4258 : 316 - 331
  • [6] Beyond TOR: The TrueNyms Protocol
    Bernard, Nicolas
    Leprevost, Franck
    SECURITY AND INTELLIGENT INFORMATION SYSTEMS, 2012, 7053 : 68 - 84
  • [7] Effective Attacks in the Tor Authentication Protocol
    Zhang, Yang
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 81 - 86
  • [8] Attacking and Improving the Tor Directory Protocol
    Luo, Zhongtang
    Bhat, Adithya
    Nayak, Kartik
    Kate, Aniket
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 3221 - 3237
  • [9] We Built This Circuit: Exploring Threat Vectors in Circuit Establishment in Tor
    Schnitzler, Theodor
    Poepper, Christina
    Duermuth, Markus
    Kohls, Katharina
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 319 - 336
  • [10] Development of a Sperm Cryopreservation Protocol for Critically Endangered Mohashol, Tor tor (Hamilton)
    Kabir, M. Salah Uddin
    Sarder, M. Rafiqul Islam
    Rahman, M. Matiur
    Mollah, M. Fazlul Awal
    Ryhan, N. Binte
    BIOPRESERVATION AND BIOBANKING, 2022, 20 (04) : 357 - 366