Total Onion Routing
Active In SP
Joined: Sep 2010
20-09-2010, 04:41 PM
Total Onion Routing
The Tor Network is a TCP overlay network whose infrastructure is run entirely by volunteers.
It is the largest public anonymity network in the world, consisting of approximately 1500 nodes
with a total capacity of approximately 3Gbps, and almost 1Gbps of total exit throughput.
Clients that use the Tor network construct paths called circuits that consist of 3 nodes (guard,
middle, and exit) upon which they route multiple TCP streams. The nodes in each circuit are
chosen probabilistically according to the maximum bandwidth they claim to observe themselves
transmit over a 24 hour period.
However, the same distributed and heterogeneous nature of the network that gives Tor its
strength is also a source of security, performance, and usability issues. The largest barrier to
widespread use of the network is performance, and the biggest user-visible performance is-
sue is not actually total capacity, but the high variance in circuit performance and non-uniform
distribution of network load.
In the current scenario in order to connect to the internet the user must use a network . In this way the user can be traced back. So as we can see there is no privacy in this type of communication. In this way a third party can use this property to hack the information that the client wishes to keep the secret. In other ways the current network are prone to eavesdropping. In order to avoid these disadvantages the TOR network was developed for people who want to maintain their identity a secret. The idea of onion routing is to protect the privacy of the sender and recipient of a message, while also providing protection for message content as it traverses a network. Here we implement a TOR network.
In the proposed system we implement a TOR network that provides the user with the advantage of privacy and security. The goal of Onion Routing (OR) is to protect the privacy of the sender and recipient of a message, while also providing protection for message content as it traverses a network of Onion Routers. The advantage of Onion Routing is that it is not necessary to trust each cooperating Router; if one or more router is compromised, anonymous communication can still be achieved. This is due to the fact that each Router in an OR network accepts messages, re-encrypts them, and transmits to another Onion Router. An attacker with the ability to monitor every Onion Router in a network might be able to trace the path of a message through the network, but an attacker with more limited capabilities will have difficulty even if he or she controls one or more Onion Routers on the message's path.
Onion routing is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. The Tor Network is a low-latency anonymity, privacy, and censorship resistance network whose servers are run by volunteers around the Internet. This distribution of trust creates resilience in the face of compromise and censorship; but it also creates performance, security, and usability issues. The Tor Flow suite attempts to address this by providing a library and associated tools for measuring Tor nodes for reliability, capacity and integrity, with the ultimate goal of feeding these measurements back into the Tor directory authorities.
Software Specification :
Front end : J2EE
Back end : My Sql
Operating System : Windows/ Linux
IDE : Net Beans
Hardware Specification :
Processor : Pentium IV
System Bus : 32 BIT
RAM : 512 MB
HDD : 40 GB
Display : SVGA Color
Key Board : Windows/Linux Compatible
Total onion routing.doc (Size: 182.5 KB / Downloads: 126)
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion