direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Page Content

Publications by Type: Undergrad Theses (Bachelor, Diplom, and Master Theses) and Study Projects

Using Onion Routing in Well-Established P2P Networks to Provide Anonymity
Citation key M-UORWP2PA-08
Author Michéle, Benjamin
Year 2008
Address Berlin, Germany
Month December
School Technische Universität Berlin
Abstract Conventional approaches providing anonymous Internet access to end users rely on chains of proxy servers called Mix-nets [82], that are based on a small set of static mixes. Some disadvantages of these approaches are, for example, weak resistance against blocking by government-level Firewalls, poor scalability, and issues related to trafficc analysis. The most well-known and established representative of this class of systems is Tor [21]. On the other hand, there are a few new systems that try to circumvent these issues by using peer-to-peer approaches, however, most of them lack a user base of summarisecient size, which is vital for any anonymity system to work reliably. In this thesis, The Anonymous Peer-to-Peer Proxy (Tap) is presented, which addresses those issues. Tap builds on the design and know-how of Tor, but brings it to the peer-to-peer world. Instead of using a small set of dedicated servers to provide the anonymizing overlay network, Tap uses all participating clients as servers as well. This approach is much more resistant to blocking due to the large amount of daily changing nodes. The geographical diversity of node addresses makes it more Diplomarbeitcult for adversaries to observe all participating nodes and therefore impairs the ability to perform attacks based on trafficc analysis. Furthermore, it scales very well because each additional client also adds his own resources to the network. To address the problem of a small user base in new systems, Tap is bundled with a popular peer-to-peer file-sharing client. As users tend to adopt new releases rapidly, a network with thousands of users could be established within a few weeks. It also provides an excellent opportunity to replace Tor's central directory servers, which are used to locate Tor routers and their corresponding keys. Tap uses the file- sharing client's mechanisms to get to know other nodes and the client's distributed hash table infrastructure to look up their respective keys.
Bibtex Type of Publication Diplomarbeit
Link to publication Download Bibtex entry

Zusatzinformationen / Extras

Quick Access:

Schnellnavigation zur Seite über Nummerneingabe

Auxiliary Functions