Publication | Open Access
Anonymous connections and onion routing
1.1K
Citations
12
References
1998
Year
Internet Traffic AnalysisEngineeringInformation SecurityNetwork AnalysisAnonymous ConnectionsPrototype OnionHardware SecurityPrivacy-preserving CommunicationVirtual Private NetworkInternet Of ThingsOnion RoutingNetwork SecurityInternet SecurityNamed Data NetworkingData PrivacyOnion RouterData SecurityCryptographyNetwork ScienceEdge ComputingSecure Routing
Onion routing provides anonymous connections resistant to eavesdropping and traffic analysis, allowing unmodified Internet applications to use proxies that strip identifying information, and has been implemented on Sun Solaris 2.X for web browsing, remote logins, and e‑mail. This paper aims to detail the implemented onion routing system, analyze its vulnerabilities, and report performance results. The authors present vulnerability analysis and performance results for the implemented system.
Onion routing provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream. Onion routing has been implemented on Sun Solaris 2.X with proxies for Web browsing, remote logins and e-mail. This paper's contribution is a detailed specification of the implemented onion routing system, a vulnerability analysis based on this specification, and performance results.
| Year | Citations | |
|---|---|---|
1997 | 10.4K | |
1981 | 4.3K | |
1994 | 3.4K | |
1992 | 1.1K | |
2002 | 630 | |
1996 | 552 | |
2002 | 309 | |
1997 | 178 | |
2002 | 103 | |
1996 | 74 |
Page 1
Page 1