Skip to main content

Congestion-Aware Path Selection for Tor

  • Conference paper
Financial Cryptography and Data Security (FC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7397))

Included in the following conference series:

Abstract

Tor, an anonymity network formed by volunteer nodes, uses the estimated bandwidth of the nodes as a central feature of its path selection algorithm. The current load on nodes is not considered in this algorithm, however, and we observe that some nodes persist in being under-utilized or congested. This can degrade the network’s performance, discourage Tor adoption, and consequently reduce the size of Tor’s anonymity set. In an effort to reduce congestion and improve load balancing, we propose a congestion-aware path selection algorithm. Using latency as an indicator of congestion, clients use opportunistic and lightweight active measurements to evaluate the congestion state of nodes, and reject nodes that appear congested. Through experiments conducted on the live Tor network, we verify our hypothesis that clients can infer congestion using latency and show that congestion-aware path selection can improve performance.

An extended version of this paper is available [22].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AlSabah, M., Bauer, K., Goldberg, I., Grunwald, D., McCoy, D., Savage, S., Voelker, G.M.: DefenestraTor: Throwing Out Windows in Tor. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 134–154. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  2. Chen, F., Perry, M.: Improving Tor path selection (July 2008), https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/proposals/151-path-selection-improvements.txt

  3. Dhungel, P., Steiner, M., Rimac, I., Hilt, V., Ross, K.W.: Waiting for anonymity: Understanding delays in the Tor overlay. In: Peer-to-Peer Computing, pp. 1–4. IEEE (2010)

    Google Scholar 

  4. Dingledine, R., Mathewson, N.: Tor Protocol Specification, https://gitweb.torproject.org/tor.git/blob_plain/HEAD:/doc/spec/tor-spec.txt (accessed August 2011)

  5. Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and the network effect. In: WEIS (June 2006)

    Google Scholar 

  6. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: USENIX Security (2004)

    Google Scholar 

  7. Dingledine, R., Murdoch, S.: Performance improvements on Tor or, why Tor is slow and what we’re going to do about it (March 2009), http://www.torproject.org/press/presskit/2009-03-11-performance.pdf

  8. Edman, M., Syverson, P.F.: AS-awareness in Tor path selection. In: Proceedings of CCS, pp. 380–389 (2009)

    Google Scholar 

  9. Evans, N., Dingledine, R., Grothoff, C.: A practical congestion attack on Tor using long paths. In: Proceedings of the 18th USENIX Security Symposium (August 2009)

    Google Scholar 

  10. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  11. Gummadi, K.P., Saroiu, S., Gribble, S.D.: King: Estimating latency between arbitrary Internet end hosts. SIGCOMM Comput. Commun. Rev. 32(3) (2002)

    Google Scholar 

  12. Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak. In: CCS (2007)

    Google Scholar 

  13. Loesing, K.: Measuring the Tor network: Evaluation of client requests to the directories. Tor Project Technical Report (2009)

    Google Scholar 

  14. Mathewson, N.: New paper by Goldberg, Stebila, and Ostaoglu with proposed circuit handshake, https://lists.torproject.org/pipermail/tor-dev/2011-May/002641.html (accessed June 2011)

  15. McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.C.: Shining Light in Dark Places: Understanding the Tor Network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63–76. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  16. Nah, F.F.-H.: A study on tolerable waiting time: How long are web users willing to wait? Behaviour Information Technology 23(3), 153–163 (2004)

    Google Scholar 

  17. Panchenko, A., Renner, J.: Path selection metrics for performance-improved onion routing. In: Proceedings of the 2009 Ninth Annual International Symposium on Applications and the Internet, pp. 114–120. IEEE Computer Society, Washington, DC (2009)

    Chapter  Google Scholar 

  18. Reardon, J., Goldberg, I.: Improving Tor using a TCP-over-DTLS tunnel. In: USENIX Security (2009)

    Google Scholar 

  19. Sherr, M., Blaze, M., Loo, B.T.: Scalable Link-Based Relay Selection for Anonymous Routing. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 73–93. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  20. Sherr, M., Mao, A., Marczak, W.R., Zhou, W., Loo, B.T., Blaze, M.: A3: An Extensible Platform for Application-Aware Anonymity. In: 17th Annual Network and Distributed System Security Symposium (NDSS) (February 2010)

    Google Scholar 

  21. Tschorsch, F., Scheuermann, B.: Proposal 182: Credit bucket, https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/proposals/182-creditbucket.txt (accessed August 2011)

  22. Wang, T., Bauer, K., Forero, C., Goldberg, I.: Congestion-aware path selection for Tor. Technical Report CACR 2011-20 (December 2011), http://www.cacr.math.uwaterloo.ca/techreports/2011/cacr2011-20.pdf

  23. Wright, M.K., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7(4), 489–522 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, T., Bauer, K., Forero, C., Goldberg, I. (2012). Congestion-Aware Path Selection for Tor. In: Keromytis, A.D. (eds) Financial Cryptography and Data Security. FC 2012. Lecture Notes in Computer Science, vol 7397. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32946-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32946-3_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32945-6

  • Online ISBN: 978-3-642-32946-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics