TU Berlin

Internet Network ArchitecturesPublications by Type: Undergrad Theses


zur Navigation

Es gibt keine deutsche Übersetzung dieser Webseite.

Publications by Type: Undergrad Theses (Bachelor, Diplom, and Master Theses) and Study Projects

Using Onion Routing in Well-Established P2P Networks to Provide Anonymity
Zitatschlüssel M-UORWP2PA-08
Autor Michéle, Benjamin
Jahr 2008
Adresse Berlin, Germany
Monat December
Schule Technische Universität Berlin
Zusammenfassung Conventional approaches providing anonymous Internet access to end users rely on chains of proxy servers called Mix-nets [82], that are based on a small set of static mixes. Some disadvantages of these approaches are, for example, weak resistance against blocking by government-level Firewalls, poor scalability, and issues related to trafficc analysis. The most well-known and established representative of this class of systems is Tor [21]. On the other hand, there are a few new systems that try to circumvent these issues by using peer-to-peer approaches, however, most of them lack a user base of summarisecient size, which is vital for any anonymity system to work reliably. In this thesis, The Anonymous Peer-to-Peer Proxy (Tap) is presented, which addresses those issues. Tap builds on the design and know-how of Tor, but brings it to the peer-to-peer world. Instead of using a small set of dedicated servers to provide the anonymizing overlay network, Tap uses all participating clients as servers as well. This approach is much more resistant to blocking due to the large amount of daily changing nodes. The geographical diversity of node addresses makes it more Diplomarbeitcult for adversaries to observe all participating nodes and therefore impairs the ability to perform attacks based on trafficc analysis. Furthermore, it scales very well because each additional client also adds his own resources to the network. To address the problem of a small user base in new systems, Tap is bundled with a popular peer-to-peer file-sharing client. As users tend to adopt new releases rapidly, a network with thousands of users could be established within a few weeks. It also provides an excellent opportunity to replace Tor's central directory servers, which are used to locate Tor routers and their corresponding keys. Tap uses the file- sharing client's mechanisms to get to know other nodes and the client's distributed hash table infrastructure to look up their respective keys.
Typ der Publikation Diplomarbeit
Link zur Publikation Download Bibtex Eintrag



Schnellnavigation zur Seite über Nummerneingabe