Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Anonymous connections and onion routing

Published: 01 September 2006 Publication History

Abstract

Onion routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing's anonymous connections are bidirectional, near real-time, and can be used anywhere a socket connection can be used. Any identifying information must be in the data stream carried over an anonymous connection. An onion is a data structure that is treated as the destination address by onion routers; thus, it is used to establish an anonymous connection. Onions themselves appear different to each onion router as well as to network observers. The same goes for data carried over the connections they establish. Proxy-aware applications, such as Web browsers and e-mail clients, require no modification to use onion routing, and do so through a series of proxies. A prototype onion routing network is running between our lab and other sites. This paper describes anonymous connections and their implementation using onion routing. This paper also describes several application proxies for onion routing, as well as configurations of onion routing networks

Cited By

View all
  • (2024)On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive SurveyACM Computing Surveys10.1145/367616456:12(1-35)Online publication date: 29-Jun-2024
  • (2024)KimeraPAD: A Novel Low-Overhead Real-Time Defense Against Website Fingerprinting Attacks Based on Deep Reinforcement LearningIEEE Transactions on Network and Service Management10.1109/TNSM.2024.336008221:3(2944-2961)Online publication date: 1-Jun-2024
  • (2024)RUDOLF: An Efficient and Adaptive Defense Approach Against Website Fingerprinting Attacks Based on Soft Actor-Critic AlgorithmIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.343681819(7794-7809)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications  Volume 16, Issue 4
September 2006
142 pages

Publisher

IEEE Press

Publication History

Published: 01 September 2006

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive SurveyACM Computing Surveys10.1145/367616456:12(1-35)Online publication date: 29-Jun-2024
  • (2024)KimeraPAD: A Novel Low-Overhead Real-Time Defense Against Website Fingerprinting Attacks Based on Deep Reinforcement LearningIEEE Transactions on Network and Service Management10.1109/TNSM.2024.336008221:3(2944-2961)Online publication date: 1-Jun-2024
  • (2024)RUDOLF: An Efficient and Adaptive Defense Approach Against Website Fingerprinting Attacks Based on Soft Actor-Critic AlgorithmIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.343681819(7794-7809)Online publication date: 1-Jan-2024
  • (2024)A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and FormalizationIEEE Communications Surveys & Tutorials10.1109/COMST.2024.335000626:3(1775-1829)Online publication date: 4-Jan-2024
  • (2024)Multi‐hop anonymous payment channel network based on onion routingIET Blockchain10.1049/blc2.120654:2(197-208)Online publication date: 4-Jun-2024
  • (2024)Counting on Rainbow k-ConnectionsTheory and Applications of Models of Computation10.1007/978-981-97-2340-9_23(272-283)Online publication date: 13-May-2024
  • (2023)Securing blockchain-based timed data release against adversarial attacksJournal of Computer Security10.3233/JCS-23000131:6(649-677)Online publication date: 10-Nov-2023
  • (2023)RETRACTED ARTICLE: Privacy-preserving routing using jointly established protocol in IoT network environmentEURASIP Journal on Wireless Communications and Networking10.1186/s13638-023-02293-w2023:1Online publication date: 22-Aug-2023
  • (2023)Blockchain and AI-assisted Onion Routing Protocol for Strengthening Anonymity in Beyond 5G IoMVs NetworksProceedings of the 2023 8th International Conference on Intelligent Information Technology10.1145/3591569.3591582(78-85)Online publication date: 24-Feb-2023
  • (2023)A General Purpose Data and Query Privacy Preserving Protocol for Wireless Sensor NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.330052418(4883-4898)Online publication date: 1-Jan-2023
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media