Advertisement

Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks

  • Jörg Lenhard
  • Karsten Loesing
  • Guido Wirtz
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5536)

Abstract

Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden services on the Internet requires complex redirection protocols to obscure the locations and identities of communication partners. The anonymity system Tor supports such a protocol for providing and accessing TCP-based services anonymously. The complexity of the hidden service protocol results in significantly higher response times which is, however, a crucial barrier to user acceptance. This communication overhead becomes even more evident when using limited access networks like cellular phone networks. We provide comprehensive measurements and statistical analysis of the bootstrapping of client processes and different sub-steps of the Tor hidden service protocol under the influence of limited access networks. Thereby, we are able to identify bottlenecks for low-bandwidth access networks and to suggest improvements regarding these networks.

Keywords

Access Network Broadband Network Rendezvous Point Connection Establishment Anonymous Communication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chen, F., Perry, M.: Improving Tor path selection. Tor Proposal 151, The Tor Project (July 2008), https://svn.torproject.org/svn/tor/trunk/doc/spec/proposals/151-path-selection-improvements.txt
  2. 2.
    Danezis, G., Serjantov, A.: Statistical disclosure or intersection attacks on anonymity systems. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 293–308. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Dingledine, R.: Keep controllers informed as Tor bootstraps. Tor Proposal 137, The Tor Project (July 2008), https://svn.torproject.org/svn/tor/trunk/doc/spec/proposals/137-bootstrap-phases.txt
  4. 4.
    Dingledine, R.: Clients download consensus + microdescriptors. Tor Proposal 158, The Tor Project (January 2009), https://svn.torproject.org/svn/tor/trunk/doc/spec/proposals/158-microdescriptors.txt
  5. 5.
    Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and the network effect. In: Anderson, R. (ed.) Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK (June 2006)Google Scholar
  6. 6.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)Google Scholar
  7. 7.
    GSM Assocication. Market Data Summary (2008), http://www.gsmworld.com/newsroom/market-data/market_data_summary.htm
  8. 8.
    Hays, W.L.: Statistics. In: Holt, Rinehart, Winston (eds.), 3rd edn. (1981) ISBN: 0-03-056706-8Google Scholar
  9. 9.
    International Telecommunications Union. V.92: Enhancements to Recommendation V.90 (November 2000), http://www.itu.int/rec/T-REC-V.92-200011-I/en
  10. 10.
    Köpsell, S.: Low latency anonymous communication – how long are users willing to wait? In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 221–237. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  11. 11.
    Loesing, K., Sandmann, W., Wilms, C., Wirtz, G.: Performance Measurements and Statistics of Tor Hidden Services. In: Proceedings of the 2008 International Symposium on Applications and the Internet (SAINT), Turku, Finland. IEEE CS Press, Los Alamitos (2008)Google Scholar
  12. 12.
    Øverlier, L., Syverson, P.: Improving efficiency and simplicity of Tor circuit establishment and hidden services. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 134–152. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  13. 13.
    Palfrader, P.: Download server descriptors on demand. Tor Proposal 141, The Tor Project (June 2008), https://svn.torproject.org/svn/tor/trunk/doc/spec/proposals/141-jit-sd-downloads.txt
  14. 14.
    Panchenko, A., Pimenidis, L., Renner, J.: Performance analysis of anonymous communication channels provided by Tor. In: ARES 2008: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security, Washington, DC, USA, pp. 221–228. IEEE Computer Society Press, Los Alamitos (2008)CrossRefGoogle Scholar
  15. 15.
    Sauter, M.: Communication Systems for the Mobile Information Society. Wiley, Chichester (2006)CrossRefGoogle Scholar
  16. 16.
    The Tor Project. Tor directory protocol, version 3 (2008), https://svn.torproject.org/svn/tor/trunk/doc/spec/dir-spec.txt
  17. 17.
    The Tor Project. Tor Rendezvous Specification (2008), https://svn.torproject.org/svn/tor/trunk/doc/spec/rend-spec.txt
  18. 18.
    Wendolsky, R., Herrmann, D., Federrath, H.: Performance comparison of low-latency anonymisation services from a user perspective. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 233–253. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Jörg Lenhard
    • 1
  • Karsten Loesing
    • 2
  • Guido Wirtz
    • 1
  1. 1.University of BambergGermany
  2. 2.The Tor ProjectUSA

Personalised recommendations