On Building Onion Routing into Future Internet Architectures

  title={On Building Onion Routing into Future Internet Architectures},
  author={Daniele Enrico Asoni and Chen Chen and David Barrera and Adrian Perrig},
  booktitle={Open Research Problems in Network Security},
User privacy on the Internet has become a pressing concern in recent years largely due to the revelations of large scale network surveillance programs. Research initiatives around future Internet architectures (FIAs) offer a unique opportunity to integrate privacy protection measures into the architecture of the network itself. In this paper, we survey the main design challenges of network layer onion routing protocols in FIAs. We empirically investigate the requirements and trade-offs of… 
1 Citations

Design of Anonymous Communication Protocol Based on Group Signature

A new onion routing protocol based on certificateless group signature, which uses the new designed certificatelessgroup signature scheme to achieve anonymous authentication of messages and improves the forwarding efficiency of the message, and further realizes the anonymous authentication and integrity of themessage forwarding.



Dovetail: Stronger Anonymity in Next-Generation Internet Routing

Dovetail, which provides anonymity against an active attacker located at any single point within the network, including the user’s ISP, is proposed, and a systematic mechanism to measure the topological anonymity of the designs is developed.

Tor: The Second-Generation Onion Router

This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points.

A survey of the research on future internet architectures

This survey article investigates the key research topics in the area of future Internet architecture and aims to draw an overall picture of the current research progress on the future internet architecture.

Tor instead of IP

This paper proposes to run Tor on top of IP instead of IP, and argues that the design achieves reasonable efficiency compared to today's Internet, and is consistent with ISP economic concerns.

HORNET: High-speed Onion Routing at the Network Layer

HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range of applications and uses only symmetric cryptography for data forwarding yet requires no per-flow state on intermediate routers.

Scalable Anonymous Communication with Provable Security

This paper proposes a new approach for secure peer-to-peer anonymous communication based on a reciprocal neighbor policy, and proposes PIR-Tor, a client-server scalable architecture for anonymous communications based on Private Information Retrieval.

PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks

This work introduces PCTCP, a novel anonymous communication transport design for overlay networks that addresses the shortcomings of the previous proposals and ascertained that significant performance benefits can be obtained using the approach for web clients, while maintaining the same level of anonymity provided by the network today.

Users get routed: traffic correlation on tor by realistic adversaries

We present the first analysis of the popular Tor anonymity network that indicates the security of typical users against reasonably realistic adversaries in the Tor network or in the underlying

Improving Tor using a TCP-over-DTLS Tunnel

This paper proposes a TCP-over-DTLS (Datagram Transport Layer Security) transport between routers that gives each stream of data its own TCP connection, and protects the TCP headers--which would otherwise give stream identification information to an attacker--with DTLS.

NIRA: A New Inter-Domain Routing Architecture

The design and evaluation of a new Internet routing architecture (NIRA) that gives a user the ability to choose the sequence of providers his packets take and shows that NIRA supports user choice with low overhead are presented.