On Building Onion Routing into Future Internet Architectures

  title={On Building Onion Routing into Future Internet Architectures},
  author={Daniele Enrico Asoni and Chen Chen and David Barrera and Adrian Perrig},
  booktitle={Open Research Problems in Network Security},
User privacy on the Internet has become a pressing concern in recent years largely due to the revelations of large scale network surveillance programs. Research initiatives around future Internet architectures (FIAs) offer a unique opportunity to integrate privacy protection measures into the architecture of the network itself. In this paper, we survey the main design challenges of network layer onion routing protocols in FIAs. We empirically investigate the requirements and trade-offs of… 
1 Citations

Design of Anonymous Communication Protocol Based on Group Signature

A new onion routing protocol based on certificateless group signature, which uses the new designed certificatelessgroup signature scheme to achieve anonymous authentication of messages and improves the forwarding efficiency of the message, and further realizes the anonymous authentication and integrity of themessage forwarding.



Dovetail: Stronger Anonymity in Next-Generation Internet Routing

Dovetail, which provides anonymity against an active attacker located at any single point within the network, including the user’s ISP, is proposed, and a systematic mechanism to measure the topological anonymity of the designs is developed.

Tor: The Second-Generation Onion Router

This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points.

A survey of the research on future internet architectures

This survey article investigates the key research topics in the area of future Internet architecture and aims to draw an overall picture of the current research progress on the future internet architecture.

Tor instead of IP

This paper proposes to run Tor on top of IP instead of IP, and argues that the design achieves reasonable efficiency compared to today's Internet, and is consistent with ISP economic concerns.

PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks

This work introduces PCTCP, a novel anonymous communication transport design for overlay networks that addresses the shortcomings of the previous proposals and ascertained that significant performance benefits can be obtained using the approach for web clients, while maintaining the same level of anonymity provided by the network today.

Users get routed: traffic correlation on tor by realistic adversaries

We present the first analysis of the popular Tor anonymity network that indicates the security of typical users against reasonably realistic adversaries in the Tor network or in the underlying

NIRA: A New Inter-Domain Routing Architecture

The design and evaluation of a new Internet routing architecture (NIRA) that gives a user the ability to choose the sequence of providers his packets take and shows that NIRA supports user choice with low overhead are presented.

SCION: Scalability, Control, and Isolation on Next-Generation Networks

This work presents the first Internet architecture designed to provide route control, failure isolation, and explicit trust information for end-to-end communications, and shows that SCION naturally prevents numerous attacks and provides a high level of resilience, scalability, control, and isolation.

Named data networking

The NDN project investigates Van Jacobson's proposed evolution from today's host-centric network architecture (IP) to a data-centricnetwork architecture (NDN), which has far-reaching implications for how the authors design, develop, deploy, and use networks and applications.

Pathlet routing

A new routing protocol, pathlet routing, in which networks advertise fragments of paths that sources concatenate into end-to-end source routes that can emulate the policies of BGP, source routing, and several recent multipath proposals is presented.