Please use this identifier to cite or link to this item:
Main Title: Exploring Deployment Strategies for the Tor Network [Extended Version]
Author(s): Döpmann, Christoph
Rust, Sebastian
Tschorsch, Florian
Type: Preprint
Language Code: en
Abstract: In response to upcoming performance and security challenges of anonymity networks like Tor, it will be of crucial importance to be able to develop and deploy performance improvements and state-of-the-art countermeasures. In this paper, we therefore explore different deployment strategies and review their applicability to the Tor network. In particular, we consider flag day, dual stack, translation, and tunneling strategies and discuss their impact on the network, as well as common risks associated with each of them. In a simulation based evaluation, which stems on historical data of Tor, we show that they can practically be applied to realize significant protocol changes in Tor. However, our results also indicate that during the transitional phase a certain degradation of anonymity is unavoidable with current viable deployment strategies.
Issue Date: 7-Jul-2018
Date Available: 8-Apr-2019
DDC Class: 004 Datenverarbeitung; Informatik
Subject(s): anonymity
Internet security
overlay networks
Series: Cryptology ePrint Archive
Series Number: 2018/661
Appears in Collections:FG Distributed Security Infrastructures (DSI) » Publications

Files in This Item:
File Description SizeFormat 
doepmann_etal_2018.pdf291.41 kBAdobe PDFThumbnail

Items in DepositOnce are protected by copyright, with all rights reserved, unless otherwise indicated.