Total Onion Routing
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 126
Joined: Sep 2010
20-09-2010, 04:41 PM

Total Onion Routing


The Tor Network is a TCP overlay network whose infrastructure is run entirely by volunteers.
It is the largest public anonymity network in the world, consisting of approximately 1500 nodes
with a total capacity of approximately 3Gbps, and almost 1Gbps of total exit throughput.

Clients that use the Tor network construct paths called circuits that consist of 3 nodes (guard,
middle, and exit) upon which they route multiple TCP streams. The nodes in each circuit are

chosen probabilistically according to the maximum bandwidth they claim to observe themselves
transmit over a 24 hour period.
However, the same distributed and heterogeneous nature of the network that gives Tor its

strength is also a source of security, performance, and usability issues. The largest barrier to
widespread use of the network is performance, and the biggest user-visible performance is-
sue is not actually total capacity, but the high variance in circuit performance and non-uniform
distribution of network load.

Existing System:

In the current scenario in order to connect to the internet the user must use a network . In this way the user can be traced back. So as we can see there is no privacy in this type of communication. In this way a third party can use this property to hack the information that the client wishes to keep the secret. In other ways the current network are prone to eavesdropping. In order to avoid these disadvantages the TOR network was developed for people who want to maintain their identity a secret. The idea of onion routing is to protect the privacy of the sender and recipient of a message, while also providing protection for message content as it traverses a network. Here we implement a TOR network.

Proposed System:

In the proposed system we implement a TOR network that provides the user with the advantage of privacy and security. The goal of Onion Routing (OR) is to protect the privacy of the sender and recipient of a message, while also providing protection for message content as it traverses a network of Onion Routers. The advantage of Onion Routing is that it is not necessary to trust each cooperating Router; if one or more router is compromised, anonymous communication can still be achieved. This is due to the fact that each Router in an OR network accepts messages, re-encrypts them, and transmits to another Onion Router. An attacker with the ability to monitor every Onion Router in a network might be able to trace the path of a message through the network, but an attacker with more limited capabilities will have difficulty even if he or she controls one or more Onion Routers on the message's path.
Onion routing is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. The Tor Network is a low-latency anonymity, privacy, and censorship resistance network whose servers are run by volunteers around the Internet. This distribution of trust creates resilience in the face of compromise and censorship; but it also creates performance, security, and usability issues. The Tor Flow suite attempts to address this by providing a library and associated tools for measuring Tor nodes for reliability, capacity and integrity, with the ultimate goal of feeding these measurements back into the Tor directory authorities.

Software Specification :
Front end : J2EE
Back end : My Sql
Operating System : Windows/ Linux
IDE : Net Beans

Hardware Specification :
Processor : Pentium IV

System Bus : 32 BIT

RAM : 512 MB

HDD : 40 GB

Display : SVGA Color
Key Board : Windows/Linux Compatible

.doc   Total onion routing.doc (Size: 182.5 KB / Downloads: 127)
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Routing in Wireless Ad Hoc Networks pdf seminar projects maker 0 321 21-09-2013, 01:05 PM
Last Post: seminar projects maker
  ALGORITHMS FOR ROUTING LOOKUPS AND PACKET CLASSIFICATION pdf seminar projects maker 0 352 11-09-2013, 12:23 PM
Last Post: seminar projects maker
  Performance Comparison of the AODV, SAODV and FLSL Routing Protocols in Mobile pdf study tips 0 433 10-09-2013, 04:02 PM
Last Post: study tips
  Opportunistic Routing in Ad-hoc Networks ppt study tips 0 275 13-08-2013, 03:37 PM
Last Post: study tips
  The Effects of Mobility on Multicast Routing in Mobile Ad Hoc Networks pdf study tips 0 329 01-08-2013, 12:58 PM
Last Post: study tips
  SECURE AD HOC NETWORK ROUTING PROTOCOLS pdf study tips 0 393 31-07-2013, 04:57 PM
Last Post: study tips
  Multi-Path Routing and Rate Allocation for Multi-Source Video On-Demand Streaming pdf study tips 0 358 30-07-2013, 02:41 PM
Last Post: study tips
  Routing PPT study tips 0 270 12-07-2013, 04:55 PM
Last Post: study tips
  Performance Comparison of Wireless Mobile Ad-Hoc Network Routing Protocols pdf study tips 0 323 04-07-2013, 02:03 PM
Last Post: study tips
  An Application-Oriented Routing Protocol for Multi-hop Cognitive Radio Report study tips 0 378 24-06-2013, 04:54 PM
Last Post: study tips