Please use this identifier to cite or link to this item: http://dx.doi.org/10.14279/depositonce-8378
Main Title: Exploring Deployment Strategies for the Tor Network
Author(s): Döpmann, Christoph
Rust, Sebastian
Tschorsch, Florian
Type: Conference Object
Language Code: en
Abstract: In response to upcoming performance and security challenges of anonymity networks like Tor, it will be of crucial importance to be able to develop and deploy performance improvements and state-of-the-art countermeasures. In this paper, we therefore explore different deployment strategies and review their applicability, impact, and risks to the Tor network. In a simulation-based evaluation, which leverages historical data of Tor, we show that the deployment strategies can practically be applied to realize significant protocol changes in Tor. Our results, however, also indicate that during the transitional phase a certain degradation of anonymity is unavoidable.
URI: https://depositonce.tu-berlin.de/handle/11303/9305
http://dx.doi.org/10.14279/depositonce-8378
Issue Date: 2018
Date Available: 9-Apr-2019
DDC Class: 004 Datenverarbeitung; Informatik
Subject(s): Internet security
overlay networks
Tor
anonymity
License: http://rightsstatements.org/vocab/InC/1.0/
Proceedings Title: 2018 IEEE 43rd Conference on Local Computer Networks (LCN)
Publisher: IEEE
Publisher Place: New York
Publisher DOI: 10.1109/LCN.2018.8638043
Page Start: 255
Page End: 258
ISBN: 978-1-5386-4413-3
978-1-5386-4414-0
ISSN: 0742-1303
Appears in Collections:FG Distributed Security Infrastructures (DSI) » Publications

Files in This Item:
File Description SizeFormat 
doepmann_etal_2018.pdf234.51 kBAdobe PDFThumbnail
View/Open


Items in DepositOnce are protected by copyright, with all rights reserved, unless otherwise indicated.