Skip to main content

A RouterUpdate Method for Tor Anonymous Communication System

  • Conference paper

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 236))

Abstract

Among all the anonymous communication systems, Onion Routing is most widely used. Tor affords users with anonymous service in communication. It can be used in running anonymous web browsing and announcement, real-time communications, IRC, SSH and other TCP applications. After analyzing the source code of the Tor system, this paper introduced the network layout, working flow, the RouterUpdate method of establishing a virtual circuit and data sending or receiving in Tor system. The method helps Tor client using the relay nodes which have been stored to connect the internet of Tor without connecting the list server. Then the paper introduced a method to help the Tor client using all the applications whether or not using the SOCKS.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  2. Goldschlag, D.M., Reed, M.G.. Syverson, P.F.: Hiding routing information. In: Proceedings of Information Hiding, vol. 1174, pp. 137–150 (1996)

    Google Scholar 

  3. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Onion routing for anonymous and private internet connections. Commun. ACM. 42(2), 39–41 (1999)

    Google Scholar 

  4. Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. 16(4), 482–494 (1998)

    Article  Google Scholar 

  5. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of USENIX Security Symposium, pp. 21–21 (2004)

    Google Scholar 

  6. Edman, M., Syverson, P.F.: AS-awareness in Tor path selection. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, pp. 380–389 (2009)

    Google Scholar 

  7. Evans, N., Dingledine, R., Grothoff, C.: A practical congestion attack on tor using long paths. In: Proceedings of the 18th USENIX Security Symposium (2009)

    Google Scholar 

  8. McLachlan, J., Tran, A., Hopper, N., Kim, Y.: Scalable onion routing with Torsk. In: Proceedings of CCS, pp. 590–599 (2009)

    Google Scholar 

  9. Jansen, R., Hopper, N., Kim, Y.: Recruiting new tor relays with BRAIDS. In: Proceedings of the 2010 ACM Conference on Computer and Communications Security, pp. 319–328 (2010)

    Google Scholar 

  10. Tang, C., Goldberg, I.: An improved algorithm for Tor circuit scheduling. In: Proceedings of the 2010 ACM Conference on Computer and Communications Security, pp. 329–339 (2010)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the following programs: the National Natural Science Foundation of China under Grant No. 61170273; Research Innovation Program for Young People of China Beijing University of Posts and Telecommunications with title “Code Security Assurance”; 2010 Information Security Program of China National Development and Reform Commission with the title “Testing Usability and Security of Network Service Software”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tianbo Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Lu, T., Xu, B., Du, S., Zhao, L., Zhang, X. (2013). A RouterUpdate Method for Tor Anonymous Communication System. In: Wong, W.E., Ma, T. (eds) Emerging Technologies for Information Systems, Computing, and Management. Lecture Notes in Electrical Engineering, vol 236. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7010-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7010-6_9

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7009-0

  • Online ISBN: 978-1-4614-7010-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics