Skip to main content

Anonymous Traffic Networks

  • Chapter
  • First Online:
The "Essence" of Network Security: An End-to-End Panorama

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 163))

Abstract

Anonymous traffic networks help anonymizing the identity and privacy of the user and their uses. There has been a great amount of interest in the research community for these implementations. Tor network, based on onion routing, has been a big volunteer-driven network and is being used worldwide. Other than Tor, implementations such as Garlic, I2P, Bitcoin, etc., use the principal concept of anonymous network. There has been plenty of implementations which tried to address the issue of anonymity and privacy has been in practice and evolving. The evolution of the decentralized web, zero-knowledge authentications, in a way, advocate the work toward anonymity and privacy. The usage of the Internet is evolving and so the traffic patterns of a user. This chapter will try to address the Idea of Anonymous Traffic Networks (ATN), Types of implementations of ATN, Challenges of ATN, Tools and Technologies around ATN, Relevance of anonymity and privacy of users for ATN, ATN—Projects and Opportunities

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. What is Data Obfuscation. https://www.talend.com/resources/data-obfuscation/

  2. Anonymity. https://en.wikipedia.org/wiki/Anonymity

  3. Privacy spooks: almost everyone involved in developing tor was (or is) funded by the US government. https://yashalevine.com/articles/tor-spooks

  4. Onion Routing-Brief Selected History. https://www.onion-router.net/History.html

  5. Hiding Routing Information. https://www.onion-router.net/Publications/IH-1996.pdf

  6. Tor Metrics: Relays and bridges. https://metrics.torproject.org/networksize.html

  7. Tor Metrics: Directly connecting users. https://metrics.torproject.org/userstats-relay-country.html

  8. Tor Metrics. https://metrics.torproject.org/

  9. Anonymity Network Tor and Performance Analysis of ‘ARANEA’—an IOT Based Privacy-Preserving Router. https://arxiv.org/ftp/arxiv/papers/1906/1906.01276.pdf

  10. Anonymous Routing of Network Traffic Using Tor. https://witestlab.poly.edu/blog/anonymous-routing-of-network-traffic-using-tor/

  11. How does VPN work. https://www.namecheap.com/vpn/how-does-vpn-virtual-private-network-work/

  12. Multi-hop VPN. https://www.comparitech.com/blog/vpn-privacy/multi-hop-vpn/

  13. Tools and Protocols for Anonymity on the Internet. https://www.cse.wustl.edu/~jain/cse571-11/ftp/anonym/index.html

  14. How Much Anonymity does Network Latency Leak? https://www.freehaven.net/anonbib/cache/tissec-latency-leak.pdf

  15. Crowds: anonymity for Web transactions—Reiter and Rubin 1998 https://dl.acm.org/doi/abs/https://doi.org/10.1145/290163.290168

  16. Tor: The Second-Generation Onion Router—Dingledine et al (2004). https://apps.dtic.mil/dtic/tr/fulltext/u2/a465464.pdf

  17. Project: AN.ON—Anonymity.Online—Federrath et al. (2006) https://anon.inf.tu-dresden.de/index_en.html

  18. Invisible Internet Project: Jrandom et al. (2007). https://staas.home.xs4all.nl/t/swtr/documents/wt2015_i2p.pdf

  19. Chaum DL (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–90. https://doi.org/10.1145/358549.358563

  20. Universal Re-encryption: For Mix-Nets and Other Applications. https://www.slideserve.com/rollo/universal-re-encryption-for-mix-nets-and-other-applications-to-appear-ct-rsa-04

  21. From a Trickle to a Flood: Active Attacks on Several Mix Types. https://www.freehaven.net/anonbib/cache/trickle02.pdf

  22. High-latency Anonymity Systems. https://www.cse.wustl.edu/~jain/cse571-11/ftp/anonym/index.html#High

  23. Mixmaster Protocol Version 2. https://tools.ietf.org/html/draft-sassaman-mixmaster-02

  24. Challenges in deploying low-latency anonymity. https://pdfs.semanticscholar.org/b019/b5b97d8b85cff0281696918b411a2cadc161.pdf

  25. Tor (anonymity network): https://en.wikipedia.org/wiki/Tor_(anonymity_network)

  26. How does Tor Work: https://robertheaton.com/2019/04/06/how-does-tor-work/

  27. TOR Nodes Explained! https://medium.com/coinmonks/tor-nodes-explained-580808c29e2d

  28. How Much Anonymity does Network Latency Leak? https://www-users.cs.umn.edu/~hoppernj/tissec-latency-leak.pdf

  29. Attacks-on-Tor: https://github.com/Attacks-on-Tor/Attacks-on-Tor

  30. Tor Installation: https://tb-manual.torproject.org/installation/

  31. Epic Browser: https://www.epicbrowser.com/

  32. Brave Browser: https://brave.com/

  33. SRWare Iron Browser: https://www.srware.net/iron/

  34. Attribution accuracy when using anonymity in group support systems: https://www.sciencedirect.com/science/article/abs/pii/S1071581997901348

  35. Online Aggression: The Influences of Anonymity and Social Modeling. https://digitalcommons.unf.edu/cgi/viewcontent.cgi?article=1472&context=etd

  36. Who Is That? The Study of Anonymity and Behavior. https://www.psychologicalscience.org/observer/who-is-that-the-study-of-anonymity-and-behavior

  37. Installing I2P: https://geti2p.net/en/download

  38. I2P Router Console view. https://upload.wikimedia.org/wikipedia/commons/f/f6/I2P_router_console_0.9.31-0.png

  39. PipeNet: https://www.weidai.com/pipenet.txt

  40. https://www.sciencedirect.com/topics/computer-science/anonymous-network

  41. Freenet https://freenetproject.org/index.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sushanta Sinha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Raje, A., Sinha, S. (2021). Anonymous Traffic Networks. In: Chakraborty, M., Singh, M., Balas, V.E., Mukhopadhyay, I. (eds) The "Essence" of Network Security: An End-to-End Panorama. Lecture Notes in Networks and Systems, vol 163. Springer, Singapore. https://doi.org/10.1007/978-981-15-9317-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9317-8_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9316-1

  • Online ISBN: 978-981-15-9317-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics