|تعداد مشاهده مقاله||2,362,924|
|تعداد دریافت فایل اصل مقاله||1,661,101|
A Comparative Study on Anonymizing Networks: TOR, I2P, and Riffle Networks Comparison
|Journal of Electrical and Computer Engineering Innovations (JECEI)|
|مقاله 1، دوره 10، شماره 2، مهر 2022، صفحه 259-272 اصل مقاله (809.57 K)|
|نوع مقاله: Review paper|
|شناسه دیجیتال (DOI): 10.22061/jecei.2021.8027.466|
|M. Hosseini Shirvani* ؛ A. Akbarifar|
|Department of Computer Engineering, Sari Branch, Islamic Azad University, Sari, Iran.|
|تاریخ دریافت: 03 مرداد 1400، تاریخ بازنگری: 10 آبان 1400، تاریخ پذیرش: 10 آبان 1400|
|Background and Objectives: Among miscellaneous networks, onion-based routing network technologies such as The Onion-based Routing (ToR), Invisible Internet Project (I2P), and Riffle networks are used to communicate anonymously by different worldwide users for security, privacy, and safety requirements. Sometimes, these types of networks sacrifice anonymity for the sake of efficient communication or vice-versa. This paper surveys aforementioned networks for investigating their potential and challenges.|
Methods: Onion-routing networks encapsulate messages in several layers of encryption similar to layers of an onion. The anonymous communication networks are involved dining cryptographers (DC) problem so-called DC-nets, which need sending anonymous message with unconditional sender and untraceable receipt. So, DC-nets must be resistant against traffic analysis attacks although they will attenuate the network bandwidth. In this line, ToR is a free software that provides anonymous communication, I2P networks are based on hidden internet service project which uses tunnelling for anonymous communications, and Riffle networks include a small set of camouflaging servers that provide anonymity for authorized users. This paper presents a comparative study on anonymizing ToR, I2P, and Riffle networks in terms of associated prominent parameters in this vein.
Results: The comparison is based on similarities, differences, and challenges in network behaviors. This comparison is beneficial for further researches and future improvements.
Conclusion: The review of the current paper reveals that the Riffle networks are more resilient and have great confidentiality and integrity against other onion-based routing networks.
|Tor Project؛ I2P Networks؛ Riffle؛ Dark-web؛ Anonymity|
 M.S. Hosseini Shirvani, A.M. Rahmani, A. Sahafi, “An iterative mathematical decision model for cloud migration: a cost and security risk approach,” Software Pract. Ex., 48(3): 449-485, 2018.
 M.S. Hosseini Shirvani, “To move or not to move: An iterative four-phase cloud adoption decision model for IT outsourcing based on TCO,” J. Soft Comput. Inf. Technol., 9(1): 7-17, 2020.
 M.S. Hosseini Shirvani, “Web Service Composition in multi-cloud environment: A bi-objective genetic optimization algorithm,” in Proc. 2018 Innovations in Intelligent Systems and Applications (INISTA): 1-6, 2018.
 The Center for Internet Security (CIS), “The CIS Security Metrics,” v1.0.0, 2010.
 B. Conrad, F. Shirazi, “A survey on Tor and I2P,” in Proc. ICIMP 2014: The Ninth International Conference on Internet Monitoring and Protection: 22, 2014.
 D. Goldschlag, M. Reed, P. Syverson, “Onion routing for anonymous and private internet connections,” Commun. ACM, 42(2): 39-41, 1999.
 G.H. Owenson, N.J. Savage, “The Tor darknet,” Global Commission on Internet Governance,” paper series no. 20, 2015.
 A. Kwon, D. Lazar, S. Devadas, B. Ford, “Riffle: An efficient communication system with strong anonymity,” Proceedings on Privacy Enhancing Technologies, 2: 115-134, 2016.
 F. Shirazi, M. Simeonovski, M.R. Asghar, “A survey on routing in anonymous communication protocol,” ACM Comput. Surv. (CSUR), 51(3): 1-39, 2018.
 B. Li, E. Erdin, M.H. Gunes, G. Bebis, T. Shipley, “An overview of anonymity technology usage,” Comput. Commun., 36(12): 1269-1283, 2014.
 E. Jardine, “The dark web dilemma: Tor, anonymity and online policing,” Global Commission on Internet Governance Paper Series 21, 2015.
 P.F. Syverson, D.M. Goldschlag, M.G. Reed, "Anonymous connections and onion routing," in Proc. IEEE Symposium on Security and Privacy (Cat. No.97CB36097): 44–54, 1997.
 M.W. Al-Nabki, E. Fidalgo, E. Alegre, L. Fernández-Robles, “ToRank: Identifying the most influential suspicious domains in the Tor network,” Expert Syst. Appl., 123: 212–226, 2019.
 Q. Yang, P. Gasti, K. Balagani, Y. Li, G. Zhou, “USB side-channel attack on Tor,” Comput. Netw., 141: 57–66, 2018.
 A. Kwon, M. AlSabah, D. Lazar, M. Dacier, S. Devadas, “Circuit fingerprinting attacks: Passive deanonymization of tor hidden services,” in Proc. 24th USENIX Security Symposium (USENIX Security 15): 287–302, Washington, D.C., USENIX Association, 2015.
 R. Attarian, L. Abdi, S. Hashemi, “AdaWFPA: Adaptive online website fingerprinting attack for Tor anonymous network: A stream-wise paradigm,” Comput. Commun., 148: 74–85, 2019.
 K. Sangeetha, K. Ravikumar, “Defense against protocol level attack in Tor network using deficit round robin queuing process,” Egyp. Inf. J., 19 (3) 199–205, 2018.
 B. Monk, J. Mitchell, R. Frank, G. Davies, “Uncovering tor: An examination of the network structure,” Secur. Commun. Netw., 2018: 1-13, 2018.
 A.S. Tanenbaum, “Distributed operating systems,” Pearson Education India, 1995.
 M.S. Hosseini Shirvani, N. Amirsoleimani, S. Salimpour, A. Azab, “Multi-criteria task scheduling in distributed systems based on fuzzy TOPSIS,” in Proc. IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), Windsor, Canada, 2017.
 Y. Ramzanpoor, M. Hosseini Shirvani, M. Golsorkhtabaramiri, “Multi-objective fault-tolerant optimization algorithm for deployment of IoT applications on fog computing infrastructure,” Complex Intell. Syst., 1-32, 2021.
 G. Danezis, C. Diaz, “A survey of anonymous communication channels,” Technical Report MSR-TR-2008-35, Microsoft Research, Jan. 2008.
 R. Dingledine, N. Mathewson, P., Syverson, “ToR: The second-generation onion router,” in Proc. 13th conference on USENIX Symposium., 13: 1-21, 2004.
 D. McCoy, k. Bauer, D. Grunwald, T. Kohno, D. Sicker, “Shining light in dark places: Understanding the Tor network,” in Proc. the 8th International Symposium, PETS 2008 Leuven, Belgium, 2008.
 H.Y. Huang, M. Bashir, “Who is behind the Onion? Understanding Tor-Relay operators," CyLab Usable Privacy and Security Laboratory (CUPS), 2016.
 A. Crenshaw, “Common darknet weaknesses: An Overview of Attack Strategies,” DEFCON 19, Las Vegas, August 6, 2011.
 M. Wahal, T. Choudhury ”Anonymous network routing mechanism," in Proc. International Conference on Infocom Technologies and Unmanned Systems, Trends and Future Directions (ICTUS), 2017.
 P. Mayamounkov, D.M. Eres, “Kademlia: A Peer-to-peer information system based on the XOR Metric,” International Workshop on Peer-to-Peer Systems. Springer, Berlin, Heidelberg, 2002.
 H. Niedermayer, “Architecture and components of secure and anonymous peer-to-peer systems,” Ph.D. dissertation, Dept. Computer Science, Univ. Munich, 2010.
 W. Diffie, M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, 22(6): 644-654, 1976.
 M. Rouse, "What is watering hole attack?,” Retrieved March. 2015; 6: 2019.
 M.G. Reed, P.F. Syverson, D.M. Goldschlag, “Anonymous connections and onion routing,” IEEE J. Sel. Areas Commun., 16(4): 482-494, 1998.
 Z.J. Newman “A high-bandwidth, low-latency system for anonymous broadcasting,” Diss. Massachusetts Institute of Technology, 2020.
تعداد مشاهده مقاله: 637
تعداد دریافت فایل اصل مقاله: 843