Tor: The Second-Generation Onion Router
@inproceedings{Dingledine2004TorTS, title={Tor: The Second-Generation Onion Router}, author={Roger Dingledine and Nick Mathewson and Paul F. Syverson}, booktitle={USENIX Security Symposium}, year={2004} }
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or…
Figures from this paper
3,896 Citations
Resisting Traffic Analysis on Unclassified Networks
- Computer Science
- 2004
This second-generation Onion Routing system adds to the first-generation design with perfect forward secrecy, congestion control, directory servers, integrity checking, variable exit policies, and a practical design for rendezvous points.
Drac: An Architecture for Anonymous Low-Volume Communications
- Computer SciencePrivacy Enhancing Technologies
- 2010
Drac is a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary using a relay based anonymization mechanism.
UDP-OR: A Fair Onion Transport Design
- Computer Science
- 2008
This paper presents a design for a end-to-end inspired transport mechanism for onion routers that uses the same solutions and implementations that had made the Internet scale and shows initial benefits of the design.
Onion Routing and Online Anonymity
- Computer Science
- 2006
The usability of both the client and server software currently released by the Tor project enhances the security of the network by providing more cover traffic and more redirection options for all users and concludes with potential future developments of the onion routing concept and improvements that could be made to Tor.
Key Management for Onion Routing in a True Peer to Peer Setting
- Computer ScienceIWSEC
- 2014
Tor implements a distributed directory listing the relays and their keys so that when a user is not able to communicate with relays directly, he has to use special bridge servers to connect to the onion network.
LASTor: A Low-Latency AS-Aware Tor Client
- Computer ScienceIEEE/ACM Transactions on Networking
- 2014
LASTor, a new Tor client that addresses shortcomings in Tor with only client-side modifications and an efficient and accurate algorithm to identify paths on which an AS can compromise anonymity by traffic correlation, is developed.
Fully non-interactive onion routing with forward secrecy
- Computer ScienceInternational Journal of Information Security
- 2012
A new onion routing protocol is put forward which outperforms TOR by achieving forward secrecy in a fully non-interactive fashion, without requiring any communication from the router and/or the users and the service provider to update time-related keys.
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer
- Computer Science2018 IEEE European Symposium on Security and Privacy (EuroS&P)
- 2018
This work proposes TARANET, an anonymity system that implements protection against traffic analysis at the network layer, and limits the incurred latency and overhead.
A RouterUpdate Method for Tor Anonymous Communication System
- Computer Science
- 2013
The network layout, working flow, the RouterUpdate method of establishing a virtual circuit and data sending or receiving in Tor system are introduced and a method to help the Tor client using all the applications whether or not using the SOCKS is introduced.
Efficient and Secure Identity-Based Onion Routing
- Computer ScienceJ. Res. Pract. Inf. Technol.
- 2014
This paper presents a novel identity-based onion routing protocol that allows users to establish anonymous channels over a public network by embedding a circuit construction into the non-interactive message delivery process.
References
SHOWING 1-10 OF 72 REFERENCES
Hiding Routing Information
- Computer ScienceInformation Hiding
- 1996
This paper describes an architecture, Onion Routing, that limits a network's vulnerability to traffic analysis and provides real-time, bi-directional, anonymous communication for any protocol that can be adapted to use a proxy service.
Onion routing access configurations
- Computer ScienceProceedings DARPA Information Survivability Conference and Exposition. DISCEX'00
- 2000
Access to an onion routing network can be configured in a variety of ways depending on the needs, policies, and facilities of those connecting, and some of these access configurations are described.
Real-time mixes: a bandwidth-efficient anonymity protocol
- Computer ScienceIEEE J. Sel. Areas Commun.
- 1998
The detailed protocols for the narrow-band ISDN (integrated services digital network), although the heart of the techniques-anonymous channels-can also be applied to other networks.
Anonymous connections and onion routing
- Computer ScienceProceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
- 1997
A detailed specification of the implemented onion routing system, a vulnerability analysis based on this specification, and performance results are provided.
P5: A protocol for scalable anonymous communication
- Computer ScienceJ. Comput. Secur.
- 2005
A novel feature of P5 is that it allows individual participants to trade-off degree of anonymity for communication efficiency, and hence can be used to scalably implement large anonymous groups.
Mixminion: design of a type III anonymous remailer protocol
- Computer Science2003 Symposium on Security and Privacy, 2003.
- 2003
Mixminion works in a real-world Internet environment, requires little synchronization or coordination between nodes, and protects against known anonymity-breaking attacks as well as or better than other systems with similar design parameters.
Herbivore: A Scalable and Efficient Protocol for Anonymous Communication
- Computer Science
- 2003
Herbivore is described, a peer-to-peer, scalable, tamper-resilient communication system that provides provable anonymity and privacy and simultaneously provides high efficiency and scalability, distinguishing it from other anonymous communication protocols.
Tarzan: a peer-to-peer anonymizing network layer
- Computer ScienceCCS '02
- 2002
Measurements show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route, and Protocols toward unbiased peer-selection offer new directions for distributing trust among untrusted entities.
A Protocol for Scalable Anonymous Communication
- Computer Science
- 1999
A novel feature of (Peer-to-Peer Personal Privacy Protocol) is that it allows individual participants to trade-off degree of anonymity for communication efficiency, and hence can be used to scalably implement large anonymous groups.
The Free Haven Project: Distributed Anonymous Storage Service
- Computer Science, MathematicsWorkshop on Design Issues in Anonymity and Unobservability
- 2000
A design for a system of anonymous storage which resists the attempts of powerful adversaries to find or destroy any stored data is presented, and a way to classify anonymous systems based on the kinds of anonymity provided is suggested.