Exploring Deployment Strategies for the Tor Network

dc.contributor.authorDöpmann, Christoph
dc.contributor.authorRust, Sebastian
dc.contributor.authorTschorsch, Florian
dc.date.accessioned2019-04-09T06:37:22Z
dc.date.available2019-04-09T06:37:22Z
dc.date.issued2018
dc.description.abstractIn response to upcoming performance and security challenges of anonymity networks like Tor, it will be of crucial importance to be able to develop and deploy performance improvements and state-of-the-art countermeasures. In this paper, we therefore explore different deployment strategies and review their applicability, impact, and risks to the Tor network. In a simulation-based evaluation, which leverages historical data of Tor, we show that the deployment strategies can practically be applied to realize significant protocol changes in Tor. Our results, however, also indicate that during the transitional phase a certain degradation of anonymity is unavoidable.en
dc.identifier.isbn978-1-5386-4413-3
dc.identifier.isbn978-1-5386-4414-0
dc.identifier.issn0742-1303
dc.identifier.urihttps://depositonce.tu-berlin.de/handle/11303/9305
dc.identifier.urihttp://dx.doi.org/10.14279/depositonce-8378
dc.language.isoen
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.subject.ddc004 Datenverarbeitung; Informatikde
dc.subject.otherInternet securityen
dc.subject.otheroverlay networksen
dc.subject.otherToren
dc.subject.otheranonymityen
dc.titleExploring Deployment Strategies for the Tor Networken
dc.typeConference Objecten
dc.type.versionacceptedVersionen
dcterms.bibliographicCitation.doi10.1109/LCN.2018.8638043
dcterms.bibliographicCitation.originalpublishernameIEEEen
dcterms.bibliographicCitation.originalpublisherplaceNew Yorken
dcterms.bibliographicCitation.pageend258
dcterms.bibliographicCitation.pagestart255
dcterms.bibliographicCitation.proceedingstitle2018 IEEE 43rd Conference on Local Computer Networks (LCN)en
tub.accessrights.dnbdomain
tub.affiliationFak. 4 Elektrotechnik und Informatik::Inst. Softwaretechnik und Theoretische Informatik::FG Distributed Security Infrastructures (DSI)de
tub.affiliation.facultyFak. 4 Elektrotechnik und Informatikde
tub.affiliation.groupFG Distributed Security Infrastructures (DSI)de
tub.affiliation.instituteInst. Softwaretechnik und Theoretische Informatikde
tub.publisher.universityorinstitutionTechnische Universität Berlinde

Files

Original bundle
Now showing 1 - 1 of 1
Loading…
Thumbnail Image
Name:
doepmann_etal_2018.pdf
Size:
234.51 KB
Format:
Adobe Portable Document Format

Collections