SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
282
CONTROL THE TRADEOFF BETWEEN PERFORMANCE AND
ANONYMITY THROUGH END-TO-END TUNABLE PATH SELECTION
K.SANGEETHA1
, Dr.K.RAVIKUMAR2
1
Research Scholar, Bharathiyar University, Coimbatore.
2
Faculty of Computer Science Department, Tamil University
ABSTRACT
Tor (originally short for The Onion Router) is a system intended to enable online anonymity.
The modern day anonymity networks hide user identities with the help of relayed anonymity routers.
However, the lack of effective trust model disables users to monitor malicious or vulnerable routers,
thus making them susceptible to such router based attacks. The Tor network uses self-reported
bandwidth values from all routers for building optimal tunnels “performance vs. anonymity”. Since
tunnels are allocated in proportion to this bandwidth, this allows a malicious router operator to attract
tunnels for compromise. This gauge being insensitive to load does not adequately respond to
changing conditions and results in unreliable performance, eventually driving users away.
Tor, a circuit-based low-latency anonymous communication service, is a protocol that is both
ore secure and performs better, both in terms of observed performance and in terms of achievable
anonymity and provides anonymous connections that are strongly resistant to both eavesdropping
and traffic analysis. This paper proposes improvements to the existing Tor router bandwidth
evaluation and router selection algorithms. Additionally, by allowing the user to select their preferred
balance of performance and anonymity, these improvements increases the usability, and therefore the
potential user base and security of the Tor network. It is proposed to increase the fidelity of the
packet-level simulation in the Tor network by including such effects as variable file sizes, variable
intervals between requests, and TCP slow-start behavior. This paper also proposes to examine the
other aspects (such as latency, apart from bandwidth) of the tradeoff between performance and
anonymity in anonymous networks of varying types and an opportunistic bandwidth measurement,
tunable performance extensions are examined in the Tor network.
Index Terms: Anonymous communication, bandwidth estimation, path selection.
1. INTRODUCTION
The second-generation Onion Routing system addresses limitations in the original design by
adding perfect forward secrecy, congestion control, directory servers, integrity checking,
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 4, July-August (2013), pp. 282-288
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
283
configurable exit policies, and a practical design for location-hidden services via rendezvous points.
Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires
little synchronization or coordination between nodes, and provides a reasonable tradeoff between
anonymity, usability, and efficiency. It is proposed to replace the Tor mechanism with an
opportunistic bandwidth measurement mechanism. Tor routers are registered with a directory
service. Each router reports its IP address, public key, and policies about what traffic it will accept,
and a bandwidth value that is determined by monitoring the peak bandwidth achieved by the router
over a Period of time. The directory service also maintains statistics about the uptime of each router.
The Tor path construction algorithm, executed by the Tor client, will first select all routers that have
an acceptable forwarding policy (e.g., many routers are unwilling to serve as exit routers) and then
choose a random router out of the list, with the selection weighted by the reported bandwidth. This
way, traffic is roughly balanced across Tor nodes in proportion to the bandwidth they have available.
2. RELATED WORK
Onion Routing is an infrastructure for private communication over a public network. It
provides anonymous connections that are strongly resistant to both eavesdropping and traffic
analysis. Onion routing's anonymous connections are bidirectional, near real-time, and can be used
anywhere a socket connection can be used. Any identifying information must be in the data stream
carried over anonymous connection. An onion is a data structure that is treated as the destination
address by onion routers; thus, it is used to establish an anonymous connection. Onions themselves
appear differently to each onion router as well as to network observers. The same goes for data
carried over the connections they establish. Proxy aware applications, such as web browsing and e-
mail, require no modification to use onion routing, and do so through a series of proxies. Tor
advertises itself as a means for people and groups to improve their privacy. And when used properly,
the distributed, anonymous network does just that. But a Swedish security consultant has used the
very same system to gain access to login credentials for a thousand or so individual email addresses,
including those of at least 100 accounts belonging to foreign embassies. The Tor servers try to make
it harder to trace the originator of traffic in much the same way an agent under surveillance might
quickly drive in
FIGURE 1: TOR NETWORK ARCHITECTURE
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
284
and out of a parking garage to throw off pursuers. Tor has taken pains to warn its users that people
running so-called exit nodes which are the last Tor servers to touch a packet before sending it on its
way.
3. PROPOSED METHODOLOGY
3.1. TOR NETWORK CREATION
Tor is free software and an open network that helps you defend against a form of network
surveillance that threatens personal freedom and privacy, confidential business activities,
relationships, and state security known as traffic analysis.
3.2. USER REQUEST-RESPONSE
Client-Server interaction is maintained in this module. Java file as input and the
corresponding output will be given as response to the client to do the task of routing packets between
networks. Because real by connecting to the server IP, client will access services available at
particular port numbers. Routing path will be specified by route configuration. Server will cache the
route and the path will be traced for routing the data through that path.
ADVANTAGES OF THE PROPOSED SYSTEM
The proposed routing solution has following advantages
1. User has many choices for router selection
2. The communication between probe and directory server is secure and authenticated.
4. SOFTWARE ROUTER CONFIGURATION
Tor network uses software routers for routing data. Software router is a term denoting a
computer or a PC designated hardware routers are costly (in most cases costlier than an average PC),
this technique of modifying the PC and using it as a router is desired. Route configuration
information will be provided to the router. Since Overlay topology is used in Tor network which is
an unstructured topology (peer knows information about the adjacent peers only) .The router used
will be static, i.e., the path through the network -a tunnel- is constructed so that each router knows
only the previous and the next router in the path. In particular, the first (entry) router knows the
source of the tunnel, but not its destination, and the last (exit) router knows the destination but not
the source.
FIGURE 2: TOR ANONYMITY SOFTWARE ARCHITECTURE
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
285
FIGURE 3: SOFTWARE ARCHITECTURE OF PROPOSED SYSTEM
User request for tunnel is handled by the Router Selection Engine. Router Selection Engine
uses the information in Directory Server to decide the route. Probe Data Collector modules collect
the data from each router probe securely and stores in directory server. Router probe collects BW,
latency, jitter and communicates securely with the Probe data collector. TOR Network simulator
simulates tor communication tunnel from source to destination based on source choice of router.
4. ENCRYPTION
Encryption in the Tor network is performed using AES algorithm.AES is a symmetric-key
algorithm, meaning the same key is used for both encrypting and decrypting the data. AES is based
on a design principle known as a substitution-permutation network. It is fast in both software and
hardware. Unlike its predecessor, DES in Tor routing path of the network, encryption in Tor network
is performed based on the number of routers in Tor routing path of the network. Encryption is based
on the fact that how many routers are there in routing path, that much times AES encryption will be
performed before routing and at each router the layers of encryption will be removed. Ultimately the
original data will be given to the destination node. AES has fixed blocks of size 128 bits and a key
size of 128,192, or 256 bits. AES operates 4×4 column-major order matrix of bytes, termed the state.
The AES cipher is specified as a number of repetitions of transformation rounds that convert the
input plain text into the final output of the cipher text. Each round consists of several processing
steps, including one that depends on encryption key.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
286
FIGURE 4: ENCRYPTION IN TOR NETWORK
Traffic it will accept and a bandwidth value that is determined by monitoring the peak
bandwidth achieved by the router over a period of time. The directory service also maintains
statistics about the uptime of each router.
6. RESULT ANALYSIS
The Tor load balancing algorithm provides a single, static compromise between performance
and anonymity. Users who are highly anonymity sensitive (e.g., whistle blowers) might wish to
distribute all of the tunnels uniformly across all routers, to prevent (purportedly) high-bandwidth
routers from having a higher chance of compromising their traffic. Users who are less privacy-
sensitive and are using the network for casual web browsing (e.g., users who want to hide their
browsing activities from their neighbors) might value performance more and would be more willing
to use high-bandwidth routers more often. By using the same path selection algorithm for both of
these, the Tor router selection algorithm sacrifices the needs of both classes.
7. TWO APPROACHES FOR QUANTIFYING PERFORMANCE
There are two general approaches for gathering performance data about overlay nodes. First,
a source node can repeatedly perform end-to-end measurements on p paths. These repeated
performance measurements expose the source node to new nodes in the system, increasing
vulnerability to passive logging attacks, and is akin to building p different paths. The alternative is to
ask nodes directly for their performance information. For example, Tor maintains node statistics on
uptime and bandwidth in a central directory. While this is scalable and more robust, it makes the
system vulnerable to malicious nodes who claim plentiful resources to bias flows to choose them as
routers. This increases the probability of success of multiple attackers colluding together to break the
anonymity of a flow. Despite systems to verify resource availability, attackers can always obtain
resource-rich machines to bias path formation. Such an attack cannot be prevented as long as path
selection is biased for resource availability.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
287
8. CONCLUSION AND FUTURE WORK
This paper proposes improvements to the existing Tor router bandwidth evaluation and router
selection algorithms. Additionally, by allowing the user to select their preferred balance of
performance and anonymity, these improvements increases the usability, and therefore the potential
user base and security of the Tor network. It is proposed to increase the fidelity of the packet-level
simulation in the Tor network by including such effects as variable file sizes, variable intervals
between requests, and TCP slow-start behavior. This paper also proposes to examine the other
aspects (such as latency, apart from bandwidth) of the tradeoff between performance and anonymity
in anonymous networks of varying types. This paper explains an opportunistic bandwidth
measurement and tunable performance extensions and examined their performance both through
simulation and in the real Tor network. Additionally, this paper focuses on observing a number of
interesting characteristics of the Tor network which could provide insight into the observed behavior
of the Tor network. Evaluations of these changes show that they can result in increasing average
throughput by a factor of almost three in exchange for a modest decrease in anonymity, or they can
result in drastically improved anonymity while maintaining similar average throughput. It also shows
that the improvement that is proposed can reduce or even eliminate the long tail of the transfer time
distribution, greatly improving performance as perceived by the users of the network. In this paper,
we have proposed improvements to the existing Tor router bandwidth evaluation and router selection
algorithms. We examined these changes individually and in combination, showing that they result in
a Tor protocol that is both more secure and performs better, both in terms of observed performance
and in terms of achievable anonymity. Additionally, by allowing the user to select their preferred
balance of performance and anonymity, increase the usability, and therefore the potential user base
and security of the Tor network. Evaluations of these changes show that they can result in increasing
average throughput by a factor of almost three in exchange for a modest decrease in anonymity, or
they can result in drastically improved anonymity while maintaining similar average throughput. We
also show that the improvements we propose can reduce or even eliminate the long tail of the
transfer time distribution, greatly improving performance as perceived by the users of the network.
We plan to expand on this work in the future in several ways: first, we are currently
implementing a more detailed, packet-level simulator of the Tor network; this will increase the
fidelity of the simulation by including such effects as variable file sizes, variable intervals between
requests, and TCP slow-start behavior. We would also like to examine the other aspects (such as
latency) of the tradeoff between performance and anonymity in anonymous networks of varying
types. Additionally, we observed a number of interesting characteristics of the Tor network over the
course of this study which could provide insight into the observed behavior of the Tor network, and
which we would like to study further.
REFERENCES
[1] P. Syverson, G. Tsudik, M. Reed, and C.Landwehr, “Towards an analysis of onion routing
security,” in Proceedings of Designing Privacy Enhancing Technologies: Workshop on
Design Issues in Anonymity and Unobservability, H. Federrath, Ed. Springer- Verlag, LNCS
2009, Jul. 2000, pp. 96.114.
[2] A. Back, I. Goldberg, and A.Shostack, “Freedom systems 2.1 security issues and analysis,”
Zero Knowledge Systems, Inc., White Paper, May 2001.
[3] R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The second generation onion router,”
in Proceedings of the 13th USENIX Security Symposium (USENIX Security '04), Aug. 2004.
[4] “TorStatus - Tor network status,” http://torstatus.kgprog.com/.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
288
[5] K. Loesing, “Measuring the Tor network,”https://git.torproject.org/checkout/metrics/mast
er/report/dirreq/directory-requests-2009-06-25.pdf.
[6] D. Goodin, “Tor at heart of embassy passwords leak,” The Register, Sep. 10, 2007.
[7] G. Goodell, S. Bradner, and M. Roussopoulos, “Building a coreless Internet without ripping
out the core,” in Fourt Workshopon Hot Topics in bNetworks, College Park, MD, Nov. 2005.
[8] K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, “Low-resource routing attacks
against anonymous systems,” in Proceedings of the 2007 Workshop on Privacy in the
Electronic Society(WPES), Oct. 2007.
[9] R. Dingledine and N. Mathewson, “Anonymity loves company: Usability and the network
effect,” in Designing Security Systems That People Can Use. O'Reilly Media, 2005.
[10] M. Wright, M. Adler, B. N. Levine, and C. Shields, “An analysis of the degradation of
anonymous protocols,” in Proceedings of the Network and Distributed Security Symposium,
Feb. 2002.
[11] S. J. Murdoch and R. N. Watson “Metrics for security and performance in low-latency
anonymity systems” in Proceedings of the 8th Privacy Enhancing Technologies Symposium
(PETS 2008), July. 2008.
[12] R. Snader and N. Borisov “A tune-up for Tor: improving security, performance and
anonymity in the Tor network” in Proceedings of the Fifteenth Annual Network and
Distributed System Security Symposium (NDSS'08), Feb. 2008
[13] D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker,” Shining light in dark places:
Understanding the Tor network” In Proceedings of the Eighth Privacy Enhancing
Technologies Symposium (PETS'08), Aug. 2009.
[14] J. Reardon and I. Goldberg, “Improving Tor using a TCP-over- DTLS tunnel”. in
Proceedings of the Eighteenth USENIX Security Symposium, Aug. 2009.
[15] P. Palfrader “Echolot” accessed on 10 August 2009.
[16] “.Eigen Speed: Secure peer-to-peer bandwidth evaluation” in Proceedings of the Eighth
International Peer-To-Peer Systems Workshop (IPTPS'09), Apr. 2009
[17] H.Jayasree and Dr. A.Damodaram, “Blacklisting and Blocking Anonymous Credential
Users”, International Journal of Computer Engineering & Technology (IJCET), Volume 3,
Issue 3, 2012, pp. 41 - 53, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[18] Srikanth T.N. and Prabhudeva S, “Explicit Study on Security Issues in Multimedia Streaming
in Peer to Peer Network”, International Journal of Computer Engineering & Technology
(IJCET), Volume 3, Issue 2, 2012, pp. 588 - 602, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.
[19] K.Sangeetha and Dr.K.Ravikumar, “A Framework for Practical Vulnerabilities of the Tor
(The Onion Routing) Anonymity Network”, International Journal of Computer Engineering
& Technology (IJCET), Volume 3, Issue 3, 2012, pp. 112 - 120, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.

More Related Content

What's hot

An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffingijcses
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSFransiskeran
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless NetworksJPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networkschennaijp
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
100 network question and answers
100 network question and answers100 network question and answers
100 network question and answersRoman Orlowski
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Torantitree
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsprjpublications
 
CCNA question and answer
CCNA question and answer   CCNA question and answer
CCNA question and answer AnamikaSinha57
 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackMehedi
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
 

What's hot (19)

An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
 
Id2414301437
Id2414301437Id2414301437
Id2414301437
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
 
Security Issues of Network Mobility (NEMO) with Tor Architecture
Security Issues of Network Mobility (NEMO) with Tor ArchitectureSecurity Issues of Network Mobility (NEMO) with Tor Architecture
Security Issues of Network Mobility (NEMO) with Tor Architecture
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless NetworksJPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
 
E42043640
E42043640E42043640
E42043640
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
100 network question and answers
100 network question and answers100 network question and answers
100 network question and answers
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
CCNA question and answer
CCNA question and answer   CCNA question and answer
CCNA question and answer
 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attack
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
ONION Routing - Jovial learning
ONION Routing - Jovial learningONION Routing - Jovial learning
ONION Routing - Jovial learning
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 

Viewers also liked

Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
A multi converter based pure solar energy system with high efficiency mppt con
A multi converter based pure solar energy system with high efficiency mppt conA multi converter based pure solar energy system with high efficiency mppt con
A multi converter based pure solar energy system with high efficiency mppt conIAEME Publication
 
Investigation into the effects of process parameters on delamination 2
Investigation into the effects of process parameters on delamination 2Investigation into the effects of process parameters on delamination 2
Investigation into the effects of process parameters on delamination 2IAEME Publication
 
Analysis and simulation of chip formation & thermal effects on tool life usin...
Analysis and simulation of chip formation & thermal effects on tool life usin...Analysis and simulation of chip formation & thermal effects on tool life usin...
Analysis and simulation of chip formation & thermal effects on tool life usin...IAEME Publication
 
Modelling of a time modulated ultra-wideband communication link
Modelling of a time modulated ultra-wideband communication linkModelling of a time modulated ultra-wideband communication link
Modelling of a time modulated ultra-wideband communication linkIAEME Publication
 
A mathematical model for predicting autoclave expansion for portland cement
A mathematical model for predicting autoclave expansion for portland cementA mathematical model for predicting autoclave expansion for portland cement
A mathematical model for predicting autoclave expansion for portland cementIAEME Publication
 
Cost based industrial rectifying sampling inspection
Cost based industrial rectifying sampling inspectionCost based industrial rectifying sampling inspection
Cost based industrial rectifying sampling inspectionIAEME Publication
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
Determination of residual stresses of welded joints prepared under
Determination of residual stresses of welded joints prepared underDetermination of residual stresses of welded joints prepared under
Determination of residual stresses of welded joints prepared underIAEME Publication
 

Viewers also liked (9)

Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
A multi converter based pure solar energy system with high efficiency mppt con
A multi converter based pure solar energy system with high efficiency mppt conA multi converter based pure solar energy system with high efficiency mppt con
A multi converter based pure solar energy system with high efficiency mppt con
 
Investigation into the effects of process parameters on delamination 2
Investigation into the effects of process parameters on delamination 2Investigation into the effects of process parameters on delamination 2
Investigation into the effects of process parameters on delamination 2
 
Analysis and simulation of chip formation & thermal effects on tool life usin...
Analysis and simulation of chip formation & thermal effects on tool life usin...Analysis and simulation of chip formation & thermal effects on tool life usin...
Analysis and simulation of chip formation & thermal effects on tool life usin...
 
Modelling of a time modulated ultra-wideband communication link
Modelling of a time modulated ultra-wideband communication linkModelling of a time modulated ultra-wideband communication link
Modelling of a time modulated ultra-wideband communication link
 
A mathematical model for predicting autoclave expansion for portland cement
A mathematical model for predicting autoclave expansion for portland cementA mathematical model for predicting autoclave expansion for portland cement
A mathematical model for predicting autoclave expansion for portland cement
 
Cost based industrial rectifying sampling inspection
Cost based industrial rectifying sampling inspectionCost based industrial rectifying sampling inspection
Cost based industrial rectifying sampling inspection
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Determination of residual stresses of welded joints prepared under
Determination of residual stresses of welded joints prepared underDetermination of residual stresses of welded joints prepared under
Determination of residual stresses of welded joints prepared under
 

Similar to Control the tradeoff between performance and anonymity through end to-end t (2)

SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamentalashrawi92
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentIJCERT
 
NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGramya marichamy
 
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIPVERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIPEditor IJMTER
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE IJERA Editor
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location InformationIJMER
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.rp5373568
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetIRJET Journal
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSAnkur Singhal
 
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...rahulmonikasharma
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
 
Networking questions
Networking questionsNetworking questions
Networking questionsrajujast
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues andijfcstjournal
 

Similar to Control the tradeoff between performance and anonymity through end to-end t (2) (20)

SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
Networks faq
Networks faqNetworks faq
Networks faq
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENING
 
Ismail&&ziko 2003
Ismail&&ziko 2003Ismail&&ziko 2003
Ismail&&ziko 2003
 
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIPVERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location Information
 
TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.TCP IP PowerPoint presentation download.
TCP IP PowerPoint presentation download.
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETS
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
 
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
Networking questions
Networking questionsNetworking questions
Networking questions
 
Study of computer network issues and
Study of computer network issues andStudy of computer network issues and
Study of computer network issues and
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Control the tradeoff between performance and anonymity through end to-end t (2)

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 282 CONTROL THE TRADEOFF BETWEEN PERFORMANCE AND ANONYMITY THROUGH END-TO-END TUNABLE PATH SELECTION K.SANGEETHA1 , Dr.K.RAVIKUMAR2 1 Research Scholar, Bharathiyar University, Coimbatore. 2 Faculty of Computer Science Department, Tamil University ABSTRACT Tor (originally short for The Onion Router) is a system intended to enable online anonymity. The modern day anonymity networks hide user identities with the help of relayed anonymity routers. However, the lack of effective trust model disables users to monitor malicious or vulnerable routers, thus making them susceptible to such router based attacks. The Tor network uses self-reported bandwidth values from all routers for building optimal tunnels “performance vs. anonymity”. Since tunnels are allocated in proportion to this bandwidth, this allows a malicious router operator to attract tunnels for compromise. This gauge being insensitive to load does not adequately respond to changing conditions and results in unreliable performance, eventually driving users away. Tor, a circuit-based low-latency anonymous communication service, is a protocol that is both ore secure and performs better, both in terms of observed performance and in terms of achievable anonymity and provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. This paper proposes improvements to the existing Tor router bandwidth evaluation and router selection algorithms. Additionally, by allowing the user to select their preferred balance of performance and anonymity, these improvements increases the usability, and therefore the potential user base and security of the Tor network. It is proposed to increase the fidelity of the packet-level simulation in the Tor network by including such effects as variable file sizes, variable intervals between requests, and TCP slow-start behavior. This paper also proposes to examine the other aspects (such as latency, apart from bandwidth) of the tradeoff between performance and anonymity in anonymous networks of varying types and an opportunistic bandwidth measurement, tunable performance extensions are examined in the Tor network. Index Terms: Anonymous communication, bandwidth estimation, path selection. 1. INTRODUCTION The second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), pp. 282-288 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 283 configurable exit policies, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, and efficiency. It is proposed to replace the Tor mechanism with an opportunistic bandwidth measurement mechanism. Tor routers are registered with a directory service. Each router reports its IP address, public key, and policies about what traffic it will accept, and a bandwidth value that is determined by monitoring the peak bandwidth achieved by the router over a Period of time. The directory service also maintains statistics about the uptime of each router. The Tor path construction algorithm, executed by the Tor client, will first select all routers that have an acceptable forwarding policy (e.g., many routers are unwilling to serve as exit routers) and then choose a random router out of the list, with the selection weighted by the reported bandwidth. This way, traffic is roughly balanced across Tor nodes in proportion to the bandwidth they have available. 2. RELATED WORK Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing's anonymous connections are bidirectional, near real-time, and can be used anywhere a socket connection can be used. Any identifying information must be in the data stream carried over anonymous connection. An onion is a data structure that is treated as the destination address by onion routers; thus, it is used to establish an anonymous connection. Onions themselves appear differently to each onion router as well as to network observers. The same goes for data carried over the connections they establish. Proxy aware applications, such as web browsing and e- mail, require no modification to use onion routing, and do so through a series of proxies. Tor advertises itself as a means for people and groups to improve their privacy. And when used properly, the distributed, anonymous network does just that. But a Swedish security consultant has used the very same system to gain access to login credentials for a thousand or so individual email addresses, including those of at least 100 accounts belonging to foreign embassies. The Tor servers try to make it harder to trace the originator of traffic in much the same way an agent under surveillance might quickly drive in FIGURE 1: TOR NETWORK ARCHITECTURE
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 284 and out of a parking garage to throw off pursuers. Tor has taken pains to warn its users that people running so-called exit nodes which are the last Tor servers to touch a packet before sending it on its way. 3. PROPOSED METHODOLOGY 3.1. TOR NETWORK CREATION Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities, relationships, and state security known as traffic analysis. 3.2. USER REQUEST-RESPONSE Client-Server interaction is maintained in this module. Java file as input and the corresponding output will be given as response to the client to do the task of routing packets between networks. Because real by connecting to the server IP, client will access services available at particular port numbers. Routing path will be specified by route configuration. Server will cache the route and the path will be traced for routing the data through that path. ADVANTAGES OF THE PROPOSED SYSTEM The proposed routing solution has following advantages 1. User has many choices for router selection 2. The communication between probe and directory server is secure and authenticated. 4. SOFTWARE ROUTER CONFIGURATION Tor network uses software routers for routing data. Software router is a term denoting a computer or a PC designated hardware routers are costly (in most cases costlier than an average PC), this technique of modifying the PC and using it as a router is desired. Route configuration information will be provided to the router. Since Overlay topology is used in Tor network which is an unstructured topology (peer knows information about the adjacent peers only) .The router used will be static, i.e., the path through the network -a tunnel- is constructed so that each router knows only the previous and the next router in the path. In particular, the first (entry) router knows the source of the tunnel, but not its destination, and the last (exit) router knows the destination but not the source. FIGURE 2: TOR ANONYMITY SOFTWARE ARCHITECTURE
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 285 FIGURE 3: SOFTWARE ARCHITECTURE OF PROPOSED SYSTEM User request for tunnel is handled by the Router Selection Engine. Router Selection Engine uses the information in Directory Server to decide the route. Probe Data Collector modules collect the data from each router probe securely and stores in directory server. Router probe collects BW, latency, jitter and communicates securely with the Probe data collector. TOR Network simulator simulates tor communication tunnel from source to destination based on source choice of router. 4. ENCRYPTION Encryption in the Tor network is performed using AES algorithm.AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. AES is based on a design principle known as a substitution-permutation network. It is fast in both software and hardware. Unlike its predecessor, DES in Tor routing path of the network, encryption in Tor network is performed based on the number of routers in Tor routing path of the network. Encryption is based on the fact that how many routers are there in routing path, that much times AES encryption will be performed before routing and at each router the layers of encryption will be removed. Ultimately the original data will be given to the destination node. AES has fixed blocks of size 128 bits and a key size of 128,192, or 256 bits. AES operates 4×4 column-major order matrix of bytes, termed the state. The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plain text into the final output of the cipher text. Each round consists of several processing steps, including one that depends on encryption key.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 286 FIGURE 4: ENCRYPTION IN TOR NETWORK Traffic it will accept and a bandwidth value that is determined by monitoring the peak bandwidth achieved by the router over a period of time. The directory service also maintains statistics about the uptime of each router. 6. RESULT ANALYSIS The Tor load balancing algorithm provides a single, static compromise between performance and anonymity. Users who are highly anonymity sensitive (e.g., whistle blowers) might wish to distribute all of the tunnels uniformly across all routers, to prevent (purportedly) high-bandwidth routers from having a higher chance of compromising their traffic. Users who are less privacy- sensitive and are using the network for casual web browsing (e.g., users who want to hide their browsing activities from their neighbors) might value performance more and would be more willing to use high-bandwidth routers more often. By using the same path selection algorithm for both of these, the Tor router selection algorithm sacrifices the needs of both classes. 7. TWO APPROACHES FOR QUANTIFYING PERFORMANCE There are two general approaches for gathering performance data about overlay nodes. First, a source node can repeatedly perform end-to-end measurements on p paths. These repeated performance measurements expose the source node to new nodes in the system, increasing vulnerability to passive logging attacks, and is akin to building p different paths. The alternative is to ask nodes directly for their performance information. For example, Tor maintains node statistics on uptime and bandwidth in a central directory. While this is scalable and more robust, it makes the system vulnerable to malicious nodes who claim plentiful resources to bias flows to choose them as routers. This increases the probability of success of multiple attackers colluding together to break the anonymity of a flow. Despite systems to verify resource availability, attackers can always obtain resource-rich machines to bias path formation. Such an attack cannot be prevented as long as path selection is biased for resource availability.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 287 8. CONCLUSION AND FUTURE WORK This paper proposes improvements to the existing Tor router bandwidth evaluation and router selection algorithms. Additionally, by allowing the user to select their preferred balance of performance and anonymity, these improvements increases the usability, and therefore the potential user base and security of the Tor network. It is proposed to increase the fidelity of the packet-level simulation in the Tor network by including such effects as variable file sizes, variable intervals between requests, and TCP slow-start behavior. This paper also proposes to examine the other aspects (such as latency, apart from bandwidth) of the tradeoff between performance and anonymity in anonymous networks of varying types. This paper explains an opportunistic bandwidth measurement and tunable performance extensions and examined their performance both through simulation and in the real Tor network. Additionally, this paper focuses on observing a number of interesting characteristics of the Tor network which could provide insight into the observed behavior of the Tor network. Evaluations of these changes show that they can result in increasing average throughput by a factor of almost three in exchange for a modest decrease in anonymity, or they can result in drastically improved anonymity while maintaining similar average throughput. It also shows that the improvement that is proposed can reduce or even eliminate the long tail of the transfer time distribution, greatly improving performance as perceived by the users of the network. In this paper, we have proposed improvements to the existing Tor router bandwidth evaluation and router selection algorithms. We examined these changes individually and in combination, showing that they result in a Tor protocol that is both more secure and performs better, both in terms of observed performance and in terms of achievable anonymity. Additionally, by allowing the user to select their preferred balance of performance and anonymity, increase the usability, and therefore the potential user base and security of the Tor network. Evaluations of these changes show that they can result in increasing average throughput by a factor of almost three in exchange for a modest decrease in anonymity, or they can result in drastically improved anonymity while maintaining similar average throughput. We also show that the improvements we propose can reduce or even eliminate the long tail of the transfer time distribution, greatly improving performance as perceived by the users of the network. We plan to expand on this work in the future in several ways: first, we are currently implementing a more detailed, packet-level simulator of the Tor network; this will increase the fidelity of the simulation by including such effects as variable file sizes, variable intervals between requests, and TCP slow-start behavior. We would also like to examine the other aspects (such as latency) of the tradeoff between performance and anonymity in anonymous networks of varying types. Additionally, we observed a number of interesting characteristics of the Tor network over the course of this study which could provide insight into the observed behavior of the Tor network, and which we would like to study further. REFERENCES [1] P. Syverson, G. Tsudik, M. Reed, and C.Landwehr, “Towards an analysis of onion routing security,” in Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed. Springer- Verlag, LNCS 2009, Jul. 2000, pp. 96.114. [2] A. Back, I. Goldberg, and A.Shostack, “Freedom systems 2.1 security issues and analysis,” Zero Knowledge Systems, Inc., White Paper, May 2001. [3] R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The second generation onion router,” in Proceedings of the 13th USENIX Security Symposium (USENIX Security '04), Aug. 2004. [4] “TorStatus - Tor network status,” http://torstatus.kgprog.com/.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 288 [5] K. Loesing, “Measuring the Tor network,”https://git.torproject.org/checkout/metrics/mast er/report/dirreq/directory-requests-2009-06-25.pdf. [6] D. Goodin, “Tor at heart of embassy passwords leak,” The Register, Sep. 10, 2007. [7] G. Goodell, S. Bradner, and M. Roussopoulos, “Building a coreless Internet without ripping out the core,” in Fourt Workshopon Hot Topics in bNetworks, College Park, MD, Nov. 2005. [8] K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, “Low-resource routing attacks against anonymous systems,” in Proceedings of the 2007 Workshop on Privacy in the Electronic Society(WPES), Oct. 2007. [9] R. Dingledine and N. Mathewson, “Anonymity loves company: Usability and the network effect,” in Designing Security Systems That People Can Use. O'Reilly Media, 2005. [10] M. Wright, M. Adler, B. N. Levine, and C. Shields, “An analysis of the degradation of anonymous protocols,” in Proceedings of the Network and Distributed Security Symposium, Feb. 2002. [11] S. J. Murdoch and R. N. Watson “Metrics for security and performance in low-latency anonymity systems” in Proceedings of the 8th Privacy Enhancing Technologies Symposium (PETS 2008), July. 2008. [12] R. Snader and N. Borisov “A tune-up for Tor: improving security, performance and anonymity in the Tor network” in Proceedings of the Fifteenth Annual Network and Distributed System Security Symposium (NDSS'08), Feb. 2008 [13] D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker,” Shining light in dark places: Understanding the Tor network” In Proceedings of the Eighth Privacy Enhancing Technologies Symposium (PETS'08), Aug. 2009. [14] J. Reardon and I. Goldberg, “Improving Tor using a TCP-over- DTLS tunnel”. in Proceedings of the Eighteenth USENIX Security Symposium, Aug. 2009. [15] P. Palfrader “Echolot” accessed on 10 August 2009. [16] “.Eigen Speed: Secure peer-to-peer bandwidth evaluation” in Proceedings of the Eighth International Peer-To-Peer Systems Workshop (IPTPS'09), Apr. 2009 [17] H.Jayasree and Dr. A.Damodaram, “Blacklisting and Blocking Anonymous Credential Users”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 41 - 53, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [18] Srikanth T.N. and Prabhudeva S, “Explicit Study on Security Issues in Multimedia Streaming in Peer to Peer Network”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 588 - 602, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [19] K.Sangeetha and Dr.K.Ravikumar, “A Framework for Practical Vulnerabilities of the Tor (The Onion Routing) Anonymity Network”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 3, 2012, pp. 112 - 120, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.