Abstract
The rapid advancement of technology has led to the evolution of the Internet, which brought changes in the lives of humans drastically. Since then slowly, all the devices started connecting via the internet user has the freedom and ability to store the information and extract it when needed. But this requires the implementation of active security measures to ensure that the data is confidential and secured. Onion routing was implemented to secure the data from eavesdropping and traffic analysis which guarantees the security of data with the help of private keys. This paper presents a detailed analysis of onion routing algorithms and its variants based on the implementation, features, security concerns and weakness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 1174, pp. 137–150 (1996)
Goldschlag, D., Reed, M., Syverson, P.: Onion routing for anonymous and private communications. Commun. ACM 42(2), 39–41 (1999)
Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. 16(4), 482–493 (1998)
Syverson, P.F., Reed, M.G., Goldschlag, D.M.: Onion Routing Access Congurations
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In:: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 2009, pp. 96–114 (2001)
Mauw, S., Verschuren, J.H.S., De Vink, E.P.: A formalization of anonymity and onion routing. In: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 3193, pp. 109–124, May 2014
Camenisch, J., Lysyanskaya, A.: A formal treatment of onion routing. In: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 3621. LNCS, pp. 169–187 (2006)
Forte, D.: Advances in onion routing: description and backtracing/investigation problems. Digit. Investig. 3(2), 85–88 (2006)
Kate, A., Zaverucha, G., Goldberg, I.: Pairing-based onion routing. In: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 4776 LNCS, pp. 95–112 (2007)
McLachlan, J., Tran, A., Hopper, N., Kim, Y.: Scalable onion routing with torsk. In: Proceedings of ACM Conference on Computer Communication Security, pp. 590–599 (2009)
Choudhary, D.: The Onion Routing. Res. Gate (2016)
Engelmann, A., Jukan, A.: Optical onion routing. In: 2017 International Conference on Computing, Networking and Communications, ICNC 2017, pp. 323–328 (2017)
Singh, N., Thawkar, S.: Securing network communication over web using onion routing. Int. J. Comput. Sci. Eng. Technol. 8(2), 8–9 (2018)
Khanum, A.. Pahal, S., Makkad, S., Panwar, A., Panwar, A.: Securing Onion Routing Against Correlation Attacks. Springer (2019)
Pavithra, S., Sivakumar, V., Pavithra, S., Tamilarasi, S.: Privacy-preserving routing for wireless network using OPERA. In: Proceedings of 2019 IEEE International Conference on Communications, Signal Processing, ICCSP 2019, pp. 415–419 (2019)
Yang, Y., Yang, L., Yang, M., Yu, H., Zhu, G., Chen, Z.: Dark web forum correlation analysis research. In: IEEE International Conference on Communications (2019)
Cambiaso, E., Vaccari, I., Patti, L., Aiello, M.: Darknet security: a categorization of attacks to the tor network. In: CEUR Workshop Proceedings, vol. 2315 (2019)
Hellebrandt, L., Homoliak, I., Malinka, K., Hanacek, P.: Increasing trust in tor node list using blockchain. In: ICBC 2019 - IEEE International Conference on Blockchain Cryptocurrency, pp. 29–32 (2019)
Chen, C., Asoni, D.E., Barrera, D., Danezis, G., Perrig, A.: HORNET: High-speed onion routing at the network layer. In: Proceedings of the ACM Conference on Computer and Communications Security, vol. 2015, pp. 1441–1454, October 2015
Catalano, D., Fiore, D., Gennaro, R.: A certificateless approach to onion routing. Int. J. Inf. Secur. 16(3), 327–343 (2017)
Hiller, J., Pennekamp, J., Dahlmanns, M., Henze, M., Panchenko, A., Wehrle, K.: Tailoring onion routing to the internet of things : security and privacy in untrusted environments. In: 2019 IEEE 27th International Conference on Network Protocols, pp. 1–12 (2019)
Zhang, Y., Weng, J., Weng, J., Li, M., Luo, W.: Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications, vol. 14, no. 8, pp. 1–13 (2019)
Gumudavally, S., Zhu, Y., Fu, H., Guan, Y.: HECTor: homomorphic encryption enabled onion routing. In: International Conference on Communications, vol. 2019, pp. 1–6, May 2019
Mccaffrey, (12) United States Patent, vol. 2 (2019)
Iacovazzi, A., Frassinelli, D., Elovici, Y.: The DUSTER Attack : Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding, pp. 213–225
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Chauhan, M., Singh, A.K., Komal (2020). Survey of Onion Routing Approaches: Advantages, Limitations and Future Scopes. In: Pandian, A., Palanisamy, R., Ntalianis, K. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). ICCBI 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-030-43192-1_76
Download citation
DOI: https://doi.org/10.1007/978-3-030-43192-1_76
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43191-4
Online ISBN: 978-3-030-43192-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)