Protecting Online Privacy by Heightening Communication Path Using Different Hops Path Tor

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The vulnerabilities within the internet cause unauthorized person to hack and steal our private data and spot our location within the cyber world. Some people do not think this as an issue. They would be more upset if the link is down, the connection is slow or when the link is intermittent. Hence, without their knowledge, their well- being is being monitored by an unknown person or group. The in- formation gained can later be used against their personal interests. Others are very concerned about this matter. They want to protect their privacy and identity in the cyber world. We proposed a solution to curb these activities by providing extra layers of internet connectivity protection, in order to create anonymous communication on demand. In this project we develop two, three and six hops security of the Tor wireless router on a Raspberry Pi 3. The client can choose to use, either hardware based 3-hops path standard security Tor or software based security Tor custom for 2-hops and 6-hops paths via application software rebuilding using MSYS2 and MNGW tool. Our result shows that there is no significant performance different in term of the connections response time regardless of the number of the Tor path lengths.

     

     


  • Keywords


    Prototyping; Privacy protection; Raspberry Pi; The Onion Router

  • References


      [1] 2015. Industrial Consortium. Industrial Internet of Things Volume G4: Security Framework. Technical report, CreateSpace Independent Publishing Platform, 2016.

      [2] Yanchao Zhang, Wei Liu, and Wenjing Lou. Anonymous communications in mobile ad hoc networks. In INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, volume 3, pages 1940–1951. IEEE, 2005.

      [3] Microsoft. Common types of network attacks, Last visited June 2017.

      [4] The Washington Post. NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say, Last visited June 2017.

      [5] Marc Mendonca. In Pursuit of Privacy on a Public Internet. PhD thesis, 2012. Copyright - Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works; Last updated - 2016-03-11.

      [6] Matthew Edman and Paul Syverson. As-awareness in tor path selection. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS ’09, pages 380–389, New York, NY, USA, 2009. ACM.

      [7] Yao Chen, Radu Sion, and Bogdan Carbunar. XPay: Practical Anonymous Payments for Tor Routing and Other Networked Services. In Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, WPES ’09, pages 41–50, New York, NY, USA, 2009. ACM.

      [8] Alexandr Vitosinschi et al. Protecting privacy using Tor. 2016.

      [9] Arma. The lifecycle of a new relay, Last visited April 2017.

      [10] Richard Horrocks. Is a server’s response to a Tor browser query encrypted by the Tor nodes when it transits the Tor circuit in the reverse direction? Last visited November 2017.

      [11] K. Bauer, J. Juen, N. Borisov, D. Grunwald, D. Sicker, and D. Mccoy. On the optimal path length for Tor. 3rd Workshop on Hot Topics in Privacy Enhancing Technologies, 2010.

      [12] Kevin Bauer, Joshua Juen, Nikita Borisov, Dirk Grunwald, Douglas Sicker, and Damon McCoy. On the optimal path length for tor. In HotPets in conjunction with Tenth International Symposium on Privacy Enhancing Technologies (PETS 2010), Berlin, Germany, 2010.

      [13] H. Teymourlouei. Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users. World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2015.

      [14] E. Erdin, C. Zachor, and M. H. Gunes. How to find hidden users: A survey of attacks on anonymity networks. IEEE Communications Surveys Tutorials, 17(4):2296–2316, Fourthquarter


 

View

Download

Article ID: 26257
 
DOI: 10.14419/ijet.v7i4.29.26257




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.