Preview

Proceedings of Telecommunication Universities

Advanced search

COMPARATIVE ANALYSIS OF LOW LATENCY ANONYMOUS COMMUNICATION SYSTEMS

https://doi.org/10.31854/1813-324Х-2018-4-3-85-97

Abstract

With the rapid development and general acceptance of the Internet globally, concealing one’s identity (remaining unknown) for protection and security reasons while communicating over Internet is of great concern. Thus, anonymity has turned into an essential and legitimate aim in numerous applications, including anonymous web surfing, location based services, and E-voting. This study compares existing implementation of various low latency anonymous communication systems, more precisely, onion routing techniques, with respect to user requirements such as performance, reliability and usability to determine their level of efficiency.

About the Authors

I. .. Murtala
De-Kharms Telecommunications
Russian Federation


O. A. Tiamiyu
University of Ilorin
Russian Federation


References

1. Ling Z., Luo J., Yu W., Fu X. Equal-Sized Cells Mean Equal-Sized Packets in Tor? // IEEE International Conference on Communications (ICC). 2011. DOI:10.1109/icc.2011.5962653.

2. Sun Q., Simon D.R., Wang Y.M., Russell W., Padmanabhan V.N., Qiu L. Statistical Identification of Encrypted Web Browsing Traffic // IEEE Symposium on Security and Privacy (SP). 2002. DOI:10.1109/SECPRI.2002.1004359.

3. Overlier L., Syverson P. Locating hidden servers // IEEE Symposium on Security and Privacy (S&P'06). 2006. DOI:10.1109/SP.2006.24.

4. Wang X., Chen S., Jajodia S. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems // IEEE Symposium on Security and Privacy (SP '07). 2007. PP. 116-130. DOI:10.1109/SP.2007.30.

5. Snader R., Borisov N.A Tune-up for Tor: Improving Security and Performance in the Tor Network // 15th Annual Network and Distributed System Security Conference (NDSS'08). 2008.

6. Beach A., Gartrell M., Han R. Solutions to Security and Privacy Issues in Mobile Social Networking // International Conference on Computational Science and Engineering. 2009. Vol. 4. PP. 1036-1042. DOI:10.1109/CSE.2009.243.

7. Chen J., Du X., Fang B. An efficient anonymous communication protocol for wireless sensor networks // Wireless Communications and Mobile Computing. 2012. Vol. 12. Iss. 14. PP. 1302-1312. DOI:10.1002/wcm.1205.

8. Jansen R., Syverson P., Hopper N. Throttling Tor Bandwidth Parasites. University of Minnesota TR 11-019, 2011. DOI:10.21236/ada559183.

9. Yu S., Zhou W., Jia W., Hu J. Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics // The Computer Journal. 2012. Vol. 55. Iss. 4. PP. 410-421. DOI:10.1093/comjnl/bxr065.

10. Wilson M., Bazli B. Forensic analysis of I2P activities // 22nd International Conference on Automation and Computing (ICAC). 2016. PP. 529-534. DOI:10.1109/IConAC.2016.7604974.

11. Dingledine R., Mathewson N., Syverson P. Tor: The Second-Generation Onion Router // 13th USENIX Security Symposium. 2004. Vol. 14. DOI:10.21236/ada465464.

12. Wendolsky R., Herrmann D., Federrath H. Performance Comparison of Low-Latency Anonymisation Services from a User Perspective. Privacy Enhancing Technologies // Lecture Notes in Computer Science. 2007. Vol. 4776. PP. 233-253. DOI:10.1007/978-3-540-75551-7_15.

13. Winkler S., Zeadally S. An analysis of tools for online anonymity // International Journal of Pervasive Computing and Communications. 2015. Vol. 11. Iss. 4. PP. 436-453. DOI:10.1108/IJPCC-08-2015-0030.

14. Kong J., Hong X. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. // 4th ACM international symposium on Mobile ad hoc networking & computing (MobiHoc '03). 2003. PP. 291-302. DOI:10.1145/ 778445.778449.

15. Fang Q., Li S., Zhou R. The Application of Onion Routing in Anonymous Communication // 2nd International Conference on MultiMedia and Information Technology (MMIT). 2010. PP. 244-246. DOI:10.1109/MMIT.2010.13.

16. Sitthiworachart J., Joy M. Web-based peer assessment system with an anonymous communication tool // IEEE International Conference on Advanced Learning Technologies. 2004. PP. 918-919. DOI:10.1109/ICALT.2004.1357720.

17. Prakash A., Agrawa D.P., Chen Y. Network Coding Combined with Onion Routing for Anonymous and Secure Communication in a Wireless Mesh Network // International journal of Computer Networks & Communications (IJCNC). 2014. Vol. 6. Iss. 6. PP. 1-14. DOI:10.5121/ijcnc.2014.6601.


Review

For citations:


Murtala I..., Tiamiyu O.A. COMPARATIVE ANALYSIS OF LOW LATENCY ANONYMOUS COMMUNICATION SYSTEMS. Proceedings of Telecommunication Universities. 2018;4(3):85-97. (In Russ.) https://doi.org/10.31854/1813-324Х-2018-4-3-85-97

Views: 286


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)