Exploring Deployment Strategies for the Tor Network
dc.contributor.author | Döpmann, Christoph | |
dc.contributor.author | Rust, Sebastian | |
dc.contributor.author | Tschorsch, Florian | |
dc.date.accessioned | 2019-04-09T06:37:22Z | |
dc.date.available | 2019-04-09T06:37:22Z | |
dc.date.issued | 2018 | |
dc.description.abstract | In response to upcoming performance and security challenges of anonymity networks like Tor, it will be of crucial importance to be able to develop and deploy performance improvements and state-of-the-art countermeasures. In this paper, we therefore explore different deployment strategies and review their applicability, impact, and risks to the Tor network. In a simulation-based evaluation, which leverages historical data of Tor, we show that the deployment strategies can practically be applied to realize significant protocol changes in Tor. Our results, however, also indicate that during the transitional phase a certain degradation of anonymity is unavoidable. | en |
dc.identifier.isbn | 978-1-5386-4413-3 | |
dc.identifier.isbn | 978-1-5386-4414-0 | |
dc.identifier.issn | 0742-1303 | |
dc.identifier.uri | https://depositonce.tu-berlin.de/handle/11303/9305 | |
dc.identifier.uri | http://dx.doi.org/10.14279/depositonce-8378 | |
dc.language.iso | en | |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | |
dc.subject.ddc | 004 Datenverarbeitung; Informatik | de |
dc.subject.other | Internet security | en |
dc.subject.other | overlay networks | en |
dc.subject.other | Tor | en |
dc.subject.other | anonymity | en |
dc.title | Exploring Deployment Strategies for the Tor Network | en |
dc.type | Conference Object | en |
dc.type.version | acceptedVersion | en |
dcterms.bibliographicCitation.doi | 10.1109/LCN.2018.8638043 | |
dcterms.bibliographicCitation.originalpublishername | IEEE | en |
dcterms.bibliographicCitation.originalpublisherplace | New York | en |
dcterms.bibliographicCitation.pageend | 258 | |
dcterms.bibliographicCitation.pagestart | 255 | |
dcterms.bibliographicCitation.proceedingstitle | 2018 IEEE 43rd Conference on Local Computer Networks (LCN) | en |
tub.accessrights.dnb | domain | |
tub.affiliation | Fak. 4 Elektrotechnik und Informatik::Inst. Softwaretechnik und Theoretische Informatik::FG Distributed Security Infrastructures (DSI) | de |
tub.affiliation.faculty | Fak. 4 Elektrotechnik und Informatik | de |
tub.affiliation.group | FG Distributed Security Infrastructures (DSI) | de |
tub.affiliation.institute | Inst. Softwaretechnik und Theoretische Informatik | de |
tub.publisher.universityorinstitution | Technische Universität Berlin | de |
Files
Original bundle
1 - 1 of 1