Hosseini Shirvani, M., Akbarifar, A.. (1401). A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison. فناوری آموزش, 10(2), 259-272. doi: 10.22061/jecei.2021.8027.466
M. Hosseini Shirvani; A. Akbarifar. "A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison". فناوری آموزش, 10, 2, 1401, 259-272. doi: 10.22061/jecei.2021.8027.466
Hosseini Shirvani, M., Akbarifar, A.. (1401). 'A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison', فناوری آموزش, 10(2), pp. 259-272. doi: 10.22061/jecei.2021.8027.466
Hosseini Shirvani, M., Akbarifar, A.. A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison. فناوری آموزش, 1401; 10(2): 259-272. doi: 10.22061/jecei.2021.8027.466
Department of Computer Engineering, Sari Branch, Islamic Azad University, Sari, Iran.
تاریخ دریافت: 03 مرداد 1400،
تاریخ بازنگری: 10 آبان 1400،
تاریخ پذیرش: 10 آبان 1400
چکیده
Background and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and Riffle networks are used to communicate anonymously by different worldwide users for security, privacy, and safety requirements. Sometimes, these types of networks sacrifice anonymity for the sake of efficient communication or vice-versa. This paper surveys aforementioned networks for investigating their potential and challenges. Methods: Onion-routing networks encapsulate messages in several layers of encryption similar to layers of an onion. The anonymous communication networks are involved dining cryptographers (DC) problem so-called DC-nets, which need sending anonymous message with unconditional sender and untraceable receipt. So, DC-nets must be resistant against traffic analysis attacks although they will attenuate the network bandwidth. In this line, ToR is a free software that provides anonymous communication, I2P networks are based on hidden internet service project which uses tunnelling for anonymous communications, and Riffle networks include a small set of camouflaging servers that provide anonymity for authorized users. This paper presents a comparative study on anonymizing ToR, I2P, and Riffle networks in terms of associated prominent parameters in this vein. Results: The comparison is based on similarities, differences, and challenges in network behaviors. This comparison is beneficial for further researches and future improvements. Conclusion: The review of the current paper reveals that the Riffle networks are more resilient and have great confidentiality and integrity against other onion-based routing networks.