DocumentCode :
3698304
Title :
The effect of malicious nodes on Tor security
Author :
Maria Khan;Muhammad Saddique;Umar Pirzada;Muhammad Zohaib;Afzaal Ali;Bilal Wadud;Imran Ahmad
Author_Institution :
Cecos University of IT &
fYear :
2015
Firstpage :
1
Lastpage :
5
Abstract :
Tor basically is designed as an overlay network for the Internet and its low latency anonymity environment is defending tens of thousands of users and protecting their privacy every day. The design had some deficiency on special nodes known as entry guards, the criteria needed to step in the anonymity network. This paper presents the effects of a number of malicious nodes on security and the compromised rate for Tor when considering all nodes as honest and introducing a very small malicious node of 100 Mbps/ 0.1 Gbps bandwidth, but relays nowadays are of much greater bandwidth and capacity. Second, if malicious nodes are more than one e.g., varied as (5 and 10) then the compromise rate diverges. In this paper, the compromise rate for high bandwidth malicious nodes and for more than one malicious node is experimented on the Tor network.
Keywords :
"Bandwidth","Relays","Security","Routing protocols","Internet","Privacy"
Publisher :
ieee
Conference_Titel :
Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference on
Type :
conf
DOI :
10.1109/ARCSE.2015.7338140
Filename :
7338140
Link To Document :
بازگشت