Total Onion Routing
#1

Total Onion Routing


Introduction:

The Tor Network is a TCP overlay network whose infrastructure is run entirely by volunteers.
It is the largest public anonymity network in the world, consisting of approximately 1500 nodes
with a total capacity of approximately 3Gbps, and almost 1Gbps of total exit throughput.

Clients that use the Tor network construct paths called circuits that consist of 3 nodes (guard,
middle, and exit) upon which they route multiple TCP streams. The nodes in each circuit are

chosen probabilistically according to the maximum bandwidth they claim to observe themselves
transmit over a 24 hour period.
However, the same distributed and heterogeneous nature of the network that gives Tor its

strength is also a source of security, performance, and usability issues. The largest barrier to
widespread use of the network is performance, and the biggest user-visible performance is-
sue is not actually total capacity, but the high variance in circuit performance and non-uniform
distribution of network load.

Existing System:

In the current scenario in order to connect to the internet the user must use a network . In this way the user can be traced back. So as we can see there is no privacy in this type of communication. In this way a third party can use this property to hack the information that the client wishes to keep the secret. In other ways the current network are prone to eavesdropping. In order to avoid these disadvantages the TOR network was developed for people who want to maintain their identity a secret. The idea of onion routing is to protect the privacy of the sender and recipient of a message, while also providing protection for message content as it traverses a network. Here we implement a TOR network.

Proposed System:

In the proposed system we implement a TOR network that provides the user with the advantage of privacy and security. The goal of Onion Routing (OR) is to protect the privacy of the sender and recipient of a message, while also providing protection for message content as it traverses a network of Onion Routers. The advantage of Onion Routing is that it is not necessary to trust each cooperating Router; if one or more router is compromised, anonymous communication can still be achieved. This is due to the fact that each Router in an OR network accepts messages, re-encrypts them, and transmits to another Onion Router. An attacker with the ability to monitor every Onion Router in a network might be able to trace the path of a message through the network, but an attacker with more limited capabilities will have difficulty even if he or she controls one or more Onion Routers on the message's path.
Onion routing is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. The Tor Network is a low-latency anonymity, privacy, and censorship resistance network whose servers are run by volunteers around the Internet. This distribution of trust creates resilience in the face of compromise and censorship; but it also creates performance, security, and usability issues. The Tor Flow suite attempts to address this by providing a library and associated tools for measuring Tor nodes for reliability, capacity and integrity, with the ultimate goal of feeding these measurements back into the Tor directory authorities.



Software Specification :
Front end : J2EE
Back end : My Sql
Operating System : Windows/ Linux
IDE : Net Beans

Hardware Specification :
Processor : Pentium IV

System Bus : 32 BIT

RAM : 512 MB

HDD : 40 GB

Display : SVGA Color
Key Board : Windows/Linux Compatible

[attachment=4176]
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: onion routing sites, onion routing pdf, onion routing seniar, ip traceback onion routing, www onion com, disadvantages of onion architecture, onion routing algorithm in java,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SEMINAR REPORT on Adaptive Routing in Adhoc Networks Computer Science Clay 2 4,928 02-01-2013, 10:25 AM
Last Post: seminar details
  AN EXTENDED ZONE ROUTING PROTOCOL FOR SERVICE DISCOVERY IN MOBILE AD HOC NETWORKS seminar presentation 1 9,306 24-12-2012, 12:47 PM
Last Post: seminar details
  Enhanced QoS Multicast Routing Protocol nit_cal 1 5,704 20-12-2012, 10:31 AM
Last Post: seminar details
  IP MULTICAST ROUTING project report helper 2 5,898 20-12-2012, 10:31 AM
Last Post: seminar details
  Distributed Cache Updating for the Dynamic Source Routing Protocol seminar class 3 2,286 17-11-2012, 01:26 PM
Last Post: seminar details
  A SURVEY OF QoS ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS project report helper 1 1,985 07-11-2012, 12:42 PM
Last Post: seminar details
  routing Protocols presentation project topics 1 3,825 07-11-2012, 12:42 PM
Last Post: seminar details
  Routing Protocols in Mobile Adhoc Networks iitbuji 2 3,633 07-11-2012, 12:41 PM
Last Post: seminar details
  Seminar on Byzantine-ResilientSecure Multicast Routing in Multi-hop Wireless Networks computer girl 0 950 11-06-2012, 05:40 PM
Last Post: computer girl
  Conflict-free scheduling and routing of automated guided vehicles in mesh topologies computer girl 0 829 05-06-2012, 12:52 PM
Last Post: computer girl

Forum Jump: