Advertisement

Survey of Onion Routing Approaches: Advantages, Limitations and Future Scopes

  • Mayank ChauhanEmail author
  • Anuj Kumar Singh
  • Komal
Conference paper
  • 38 Downloads
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 49)

Abstract

The rapid advancement of technology has led to the evolution of the Internet, which brought changes in the lives of humans drastically. Since then slowly, all the devices started connecting via the internet user has the freedom and ability to store the information and extract it when needed. But this requires the implementation of active security measures to ensure that the data is confidential and secured. Onion routing was implemented to secure the data from eavesdropping and traffic analysis which guarantees the security of data with the help of private keys. This paper presents a detailed analysis of onion routing algorithms and its variants based on the implementation, features, security concerns and weakness.

Keywords

Onion routing Traffic analysis Anonymous connection Data latency Onion router System design Security 

References

  1. 1.
    Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 1174, pp. 137–150 (1996)CrossRefGoogle Scholar
  2. 2.
    Goldschlag, D., Reed, M., Syverson, P.: Onion routing for anonymous and private communications. Commun. ACM 42(2), 39–41 (1999)CrossRefGoogle Scholar
  3. 3.
    Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. 16(4), 482–493 (1998)CrossRefGoogle Scholar
  4. 4.
    Syverson, P.F., Reed, M.G., Goldschlag, D.M.: Onion Routing Access CongurationsGoogle Scholar
  5. 5.
    Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In:: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 2009, pp. 96–114 (2001)CrossRefGoogle Scholar
  6. 6.
    Mauw, S., Verschuren, J.H.S., De Vink, E.P.: A formalization of anonymity and onion routing. In: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 3193, pp. 109–124, May 2014CrossRefGoogle Scholar
  7. 7.
    Camenisch, J., Lysyanskaya, A.: A formal treatment of onion routing. In: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 3621. LNCS, pp. 169–187 (2006)CrossRefGoogle Scholar
  8. 8.
    Forte, D.: Advances in onion routing: description and backtracing/investigation problems. Digit. Investig. 3(2), 85–88 (2006)CrossRefGoogle Scholar
  9. 9.
    Kate, A., Zaverucha, G., Goldberg, I.: Pairing-based onion routing. In: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 4776 LNCS, pp. 95–112 (2007)Google Scholar
  10. 10.
    McLachlan, J., Tran, A., Hopper, N., Kim, Y.: Scalable onion routing with torsk. In: Proceedings of ACM Conference on Computer Communication Security, pp. 590–599 (2009)Google Scholar
  11. 11.
    Choudhary, D.: The Onion Routing. Res. Gate (2016)Google Scholar
  12. 12.
    Engelmann, A., Jukan, A.: Optical onion routing. In: 2017 International Conference on Computing, Networking and Communications, ICNC 2017, pp. 323–328 (2017)Google Scholar
  13. 13.
    Singh, N., Thawkar, S.: Securing network communication over web using onion routing. Int. J. Comput. Sci. Eng. Technol. 8(2), 8–9 (2018)Google Scholar
  14. 14.
    Khanum, A.. Pahal, S., Makkad, S., Panwar, A., Panwar, A.: Securing Onion Routing Against Correlation Attacks. Springer (2019)Google Scholar
  15. 15.
    Pavithra, S., Sivakumar, V., Pavithra, S., Tamilarasi, S.: Privacy-preserving routing for wireless network using OPERA. In: Proceedings of 2019 IEEE International Conference on Communications, Signal Processing, ICCSP 2019, pp. 415–419 (2019)Google Scholar
  16. 16.
    Yang, Y., Yang, L., Yang, M., Yu, H., Zhu, G., Chen, Z.: Dark web forum correlation analysis research. In: IEEE International Conference on Communications (2019)Google Scholar
  17. 17.
    Cambiaso, E., Vaccari, I., Patti, L., Aiello, M.: Darknet security: a categorization of attacks to the tor network. In: CEUR Workshop Proceedings, vol. 2315 (2019)Google Scholar
  18. 18.
    Hellebrandt, L., Homoliak, I., Malinka, K., Hanacek, P.: Increasing trust in tor node list using blockchain. In: ICBC 2019 - IEEE International Conference on Blockchain Cryptocurrency, pp. 29–32 (2019)Google Scholar
  19. 19.
    Chen, C., Asoni, D.E., Barrera, D., Danezis, G., Perrig, A.: HORNET: High-speed onion routing at the network layer. In: Proceedings of the ACM Conference on Computer and Communications Security, vol. 2015, pp. 1441–1454, October 2015Google Scholar
  20. 20.
    Catalano, D., Fiore, D., Gennaro, R.: A certificateless approach to onion routing. Int. J. Inf. Secur. 16(3), 327–343 (2017)CrossRefGoogle Scholar
  21. 21.
    Hiller, J., Pennekamp, J., Dahlmanns, M., Henze, M., Panchenko, A., Wehrle, K.: Tailoring onion routing to the internet of things : security and privacy in untrusted environments. In: 2019 IEEE 27th International Conference on Network Protocols, pp. 1–12 (2019)Google Scholar
  22. 22.
    Zhang, Y., Weng, J., Weng, J., Li, M., Luo, W.: Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications, vol. 14, no. 8, pp. 1–13 (2019)Google Scholar
  23. 23.
    Gumudavally, S., Zhu, Y., Fu, H., Guan, Y.: HECTor: homomorphic encryption enabled onion routing. In: International Conference on Communications, vol. 2019, pp. 1–6, May 2019Google Scholar
  24. 24.
    Mccaffrey, (12) United States Patent, vol. 2 (2019)Google Scholar
  25. 25.
    Iacovazzi, A., Frassinelli, D., Elovici, Y.: The DUSTER Attack : Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding, pp. 213–225Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Amity UniversityGurgaonIndia

Personalised recommendations