Abstract
Anonymous traffic networks help anonymizing the identity and privacy of the user and their uses. There has been a great amount of interest in the research community for these implementations. Tor network, based on onion routing, has been a big volunteer-driven network and is being used worldwide. Other than Tor, implementations such as Garlic, I2P, Bitcoin, etc., use the principal concept of anonymous network. There has been plenty of implementations which tried to address the issue of anonymity and privacy has been in practice and evolving. The evolution of the decentralized web, zero-knowledge authentications, in a way, advocate the work toward anonymity and privacy. The usage of the Internet is evolving and so the traffic patterns of a user. This chapter will try to address the Idea of Anonymous Traffic Networks (ATN), Types of implementations of ATN, Challenges of ATN, Tools and Technologies around ATN, Relevance of anonymity and privacy of users for ATN, ATN—Projects and Opportunities
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
What is Data Obfuscation. https://www.talend.com/resources/data-obfuscation/
Anonymity. https://en.wikipedia.org/wiki/Anonymity
Privacy spooks: almost everyone involved in developing tor was (or is) funded by the US government. https://yashalevine.com/articles/tor-spooks
Onion Routing-Brief Selected History. https://www.onion-router.net/History.html
Hiding Routing Information. https://www.onion-router.net/Publications/IH-1996.pdf
Tor Metrics: Relays and bridges. https://metrics.torproject.org/networksize.html
Tor Metrics: Directly connecting users. https://metrics.torproject.org/userstats-relay-country.html
Tor Metrics. https://metrics.torproject.org/
Anonymity Network Tor and Performance Analysis of ‘ARANEA’—an IOT Based Privacy-Preserving Router. https://arxiv.org/ftp/arxiv/papers/1906/1906.01276.pdf
Anonymous Routing of Network Traffic Using Tor. https://witestlab.poly.edu/blog/anonymous-routing-of-network-traffic-using-tor/
How does VPN work. https://www.namecheap.com/vpn/how-does-vpn-virtual-private-network-work/
Multi-hop VPN. https://www.comparitech.com/blog/vpn-privacy/multi-hop-vpn/
Tools and Protocols for Anonymity on the Internet. https://www.cse.wustl.edu/~jain/cse571-11/ftp/anonym/index.html
How Much Anonymity does Network Latency Leak? https://www.freehaven.net/anonbib/cache/tissec-latency-leak.pdf
Crowds: anonymity for Web transactions—Reiter and Rubin 1998 https://dl.acm.org/doi/abs/https://doi.org/10.1145/290163.290168
Tor: The Second-Generation Onion Router—Dingledine et al (2004). https://apps.dtic.mil/dtic/tr/fulltext/u2/a465464.pdf
Project: AN.ON—Anonymity.Online—Federrath et al. (2006) https://anon.inf.tu-dresden.de/index_en.html
Invisible Internet Project: Jrandom et al. (2007). https://staas.home.xs4all.nl/t/swtr/documents/wt2015_i2p.pdf
Chaum DL (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–90. https://doi.org/10.1145/358549.358563
Universal Re-encryption: For Mix-Nets and Other Applications. https://www.slideserve.com/rollo/universal-re-encryption-for-mix-nets-and-other-applications-to-appear-ct-rsa-04
From a Trickle to a Flood: Active Attacks on Several Mix Types. https://www.freehaven.net/anonbib/cache/trickle02.pdf
High-latency Anonymity Systems. https://www.cse.wustl.edu/~jain/cse571-11/ftp/anonym/index.html#High
Mixmaster Protocol Version 2. https://tools.ietf.org/html/draft-sassaman-mixmaster-02
Challenges in deploying low-latency anonymity. https://pdfs.semanticscholar.org/b019/b5b97d8b85cff0281696918b411a2cadc161.pdf
Tor (anonymity network): https://en.wikipedia.org/wiki/Tor_(anonymity_network)
How does Tor Work: https://robertheaton.com/2019/04/06/how-does-tor-work/
TOR Nodes Explained! https://medium.com/coinmonks/tor-nodes-explained-580808c29e2d
How Much Anonymity does Network Latency Leak? https://www-users.cs.umn.edu/~hoppernj/tissec-latency-leak.pdf
Attacks-on-Tor: https://github.com/Attacks-on-Tor/Attacks-on-Tor
Tor Installation: https://tb-manual.torproject.org/installation/
Epic Browser: https://www.epicbrowser.com/
Brave Browser: https://brave.com/
SRWare Iron Browser: https://www.srware.net/iron/
Attribution accuracy when using anonymity in group support systems: https://www.sciencedirect.com/science/article/abs/pii/S1071581997901348
Online Aggression: The Influences of Anonymity and Social Modeling. https://digitalcommons.unf.edu/cgi/viewcontent.cgi?article=1472&context=etd
Who Is That? The Study of Anonymity and Behavior. https://www.psychologicalscience.org/observer/who-is-that-the-study-of-anonymity-and-behavior
Installing I2P: https://geti2p.net/en/download
I2P Router Console view. https://upload.wikimedia.org/wikipedia/commons/f/f6/I2P_router_console_0.9.31-0.png
PipeNet: https://www.weidai.com/pipenet.txt
https://www.sciencedirect.com/topics/computer-science/anonymous-network
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Raje, A., Sinha, S. (2021). Anonymous Traffic Networks. In: Chakraborty, M., Singh, M., Balas, V.E., Mukhopadhyay, I. (eds) The "Essence" of Network Security: An End-to-End Panorama. Lecture Notes in Networks and Systems, vol 163. Springer, Singapore. https://doi.org/10.1007/978-981-15-9317-8_11
Download citation
DOI: https://doi.org/10.1007/978-981-15-9317-8_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9316-1
Online ISBN: 978-981-15-9317-8
eBook Packages: EngineeringEngineering (R0)