• DocumentCode
    258298
  • Title

    The TOR data communication system: A survey

  • Author

    Haraty, Ramzi A. ; Zantout, Bassam

  • Author_Institution
    Dept. of Comput. Sci. & Math., Lebanese American Univ., Beirut, Lebanon
  • fYear
    2014
  • fDate
    23-26 June 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender´s identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity - TOR. The paper also scrupulously presents the benefits and drawbacks of TOR.
  • Keywords
    Internet; computer network security; cryptography; data communication; data privacy; telecommunication network routing; telecommunication traffic; Internet; TOR data communication system; data communication; data integrity; data transfer; information encryption; security officers; security standards; traffic analysis; Bridge circuits; Cryptography; Internet; Peer-to-peer computing; Receivers; Routing; Software; Anonymous system; TOR; data communication; security and integrity;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computers and Communication (ISCC), 2014 IEEE Symposium on
  • Conference_Location
    Funchal
  • Type

    conf

  • DOI
    10.1109/ISCC.2014.6912635
  • Filename
    6912635