Skip to main content

Survey of Onion Routing Approaches: Advantages, Limitations and Future Scopes

  • Conference paper
  • First Online:
Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019) (ICCBI 2019)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 49))

Included in the following conference series:

Abstract

The rapid advancement of technology has led to the evolution of the Internet, which brought changes in the lives of humans drastically. Since then slowly, all the devices started connecting via the internet user has the freedom and ability to store the information and extract it when needed. But this requires the implementation of active security measures to ensure that the data is confidential and secured. Onion routing was implemented to secure the data from eavesdropping and traffic analysis which guarantees the security of data with the help of private keys. This paper presents a detailed analysis of onion routing algorithms and its variants based on the implementation, features, security concerns and weakness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 1174, pp. 137–150 (1996)

    Chapter  Google Scholar 

  2. Goldschlag, D., Reed, M., Syverson, P.: Onion routing for anonymous and private communications. Commun. ACM 42(2), 39–41 (1999)

    Article  Google Scholar 

  3. Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. 16(4), 482–493 (1998)

    Article  Google Scholar 

  4. Syverson, P.F., Reed, M.G., Goldschlag, D.M.: Onion Routing Access Congurations

    Google Scholar 

  5. Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In:: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 2009, pp. 96–114 (2001)

    Chapter  Google Scholar 

  6. Mauw, S., Verschuren, J.H.S., De Vink, E.P.: A formalization of anonymity and onion routing. In: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 3193, pp. 109–124, May 2014

    Chapter  Google Scholar 

  7. Camenisch, J., Lysyanskaya, A.: A formal treatment of onion routing. In: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 3621. LNCS, pp. 169–187 (2006)

    Chapter  Google Scholar 

  8. Forte, D.: Advances in onion routing: description and backtracing/investigation problems. Digit. Investig. 3(2), 85–88 (2006)

    Article  Google Scholar 

  9. Kate, A., Zaverucha, G., Goldberg, I.: Pairing-based onion routing. In: Lecture Notes Computer. Science. (including Subser. Lecture Notes Artificial Intelligence. Lectures Notes Bioinformatics), vol. 4776 LNCS, pp. 95–112 (2007)

    Google Scholar 

  10. McLachlan, J., Tran, A., Hopper, N., Kim, Y.: Scalable onion routing with torsk. In: Proceedings of ACM Conference on Computer Communication Security, pp. 590–599 (2009)

    Google Scholar 

  11. Choudhary, D.: The Onion Routing. Res. Gate (2016)

    Google Scholar 

  12. Engelmann, A., Jukan, A.: Optical onion routing. In: 2017 International Conference on Computing, Networking and Communications, ICNC 2017, pp. 323–328 (2017)

    Google Scholar 

  13. Singh, N., Thawkar, S.: Securing network communication over web using onion routing. Int. J. Comput. Sci. Eng. Technol. 8(2), 8–9 (2018)

    Google Scholar 

  14. Khanum, A.. Pahal, S., Makkad, S., Panwar, A., Panwar, A.: Securing Onion Routing Against Correlation Attacks. Springer (2019)

    Google Scholar 

  15. Pavithra, S., Sivakumar, V., Pavithra, S., Tamilarasi, S.: Privacy-preserving routing for wireless network using OPERA. In: Proceedings of 2019 IEEE International Conference on Communications, Signal Processing, ICCSP 2019, pp. 415–419 (2019)

    Google Scholar 

  16. Yang, Y., Yang, L., Yang, M., Yu, H., Zhu, G., Chen, Z.: Dark web forum correlation analysis research. In: IEEE International Conference on Communications (2019)

    Google Scholar 

  17. Cambiaso, E., Vaccari, I., Patti, L., Aiello, M.: Darknet security: a categorization of attacks to the tor network. In: CEUR Workshop Proceedings, vol. 2315 (2019)

    Google Scholar 

  18. Hellebrandt, L., Homoliak, I., Malinka, K., Hanacek, P.: Increasing trust in tor node list using blockchain. In: ICBC 2019 - IEEE International Conference on Blockchain Cryptocurrency, pp. 29–32 (2019)

    Google Scholar 

  19. Chen, C., Asoni, D.E., Barrera, D., Danezis, G., Perrig, A.: HORNET: High-speed onion routing at the network layer. In: Proceedings of the ACM Conference on Computer and Communications Security, vol. 2015, pp. 1441–1454, October 2015

    Google Scholar 

  20. Catalano, D., Fiore, D., Gennaro, R.: A certificateless approach to onion routing. Int. J. Inf. Secur. 16(3), 327–343 (2017)

    Article  Google Scholar 

  21. Hiller, J., Pennekamp, J., Dahlmanns, M., Henze, M., Panchenko, A., Wehrle, K.: Tailoring onion routing to the internet of things : security and privacy in untrusted environments. In: 2019 IEEE 27th International Conference on Network Protocols, pp. 1–12 (2019)

    Google Scholar 

  22. Zhang, Y., Weng, J., Weng, J., Li, M., Luo, W.: Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications, vol. 14, no. 8, pp. 1–13 (2019)

    Google Scholar 

  23. Gumudavally, S., Zhu, Y., Fu, H., Guan, Y.: HECTor: homomorphic encryption enabled onion routing. In: International Conference on Communications, vol. 2019, pp. 1–6, May 2019

    Google Scholar 

  24. Mccaffrey, (12) United States Patent, vol. 2 (2019)

    Google Scholar 

  25. Iacovazzi, A., Frassinelli, D., Elovici, Y.: The DUSTER Attack : Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding, pp. 213–225

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mayank Chauhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chauhan, M., Singh, A.K., Komal (2020). Survey of Onion Routing Approaches: Advantages, Limitations and Future Scopes. In: Pandian, A., Palanisamy, R., Ntalianis, K. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). ICCBI 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-030-43192-1_76

Download citation

Publish with us

Policies and ethics