Anonymous connections and onion routing
Open Access
- 1 May 1998
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 16 (4), 482-494
- https://doi.org/10.1109/49.668972
Abstract
Onion routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing's anonymous connections are bidirectional, near real-time, and can be used anywhere a socket connection can be used. Any identifying information must be in the data stream carried over an anonymous connection. An onion is a data structure that is treated as the destination address by onion routers; thus, it is used to establish an anonymous connection. Onions themselves appear different to each onion router as well as to network observers. The same goes for data carried over the connections they establish. Proxy-aware applications, such as Web browsers and e-mail clients, require no modification to use onion routing, and do so through a series of proxies. A prototype onion routing network is running between our lab and other sites. This paper describes anonymous connections and their implementation using onion routing. This paper also describes several application proxies for onion routing, as well as configurations of onion routing networks.Keywords
This publication has 8 references indexed in Scilit:
- Proxies for anonymous routingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Anonymous connections and onion routingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- How to make personalized web browsing simple, secure, and anonymousLecture Notes in Computer Science, 1997
- Analyzing and comparing Montgomery multiplication algorithmsIEEE Micro, 1996
- Variable and scalable security: protection of location information in mobile IPPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1996
- Hiding Routing informationLecture Notes in Computer Science, 1996
- Authentication and authenticated key exchangesDesigns, Codes and Cryptography, 1992
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981