Article

Efficient and secure identity-based onion routing

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Onion routing protocols achieve low-latency anonymous communication on public networks. To date, many onion routing protocols have been proposed, such as Tor network, in order to implement the anony mous network connection in the public networks. Although the previous schemes' multi-pass crypto graphic circuit construction appears satisfactory, their circuit construction protocols have some drawbacks with regard to the efficiency and security. This paper presents a novel identity-based onion routing protocol that allows users to establish anonymous channels over a public network. The proposed scheme eliminates iterative and interactive symmetric key agreement procedures between users and onion routers by embedding a circuit construction into the non-interactive message delivery process. It significantly improves the storage and communication costs required from each user and onion router compared to the previous onion routing protocols, while requiring comparable computation cost to them.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Many papers have been published to date by researchers across the globe on the security, privacy, and anonymity of connected vehicular systems [19,2,8,12,20,21]. Most of them have focused on either security and privacy, but only a few researchers have given their thoughts on the anonymity of the sender, receiver, and the data path. ...
... As per the literature, very few papers use blockchain to maintain the anonymity of SCVs in military operations. Hur et al. [19] Presented an onion routing-based solution to setup anonymous channels from source to destination with security. But, they didn't focus on the trust and network latency, and reliability issues. ...
Article
With the popularity of blockchain technology in terms of security, privacy, traceability, and trust, it is being applied in various major applications concerning connected autonomous vehicles. One of the most sensitive applications is military operations, where we do not compromise with either security, privacy, trust, and communication latency of connected military vehicles, i.e., Internet of military vehicles (IoMVs). Achieving anonymity along with security and privacy of sender, receiver, and a data path for IoMVS is still an open question. Efforts we have made to address the aforementioned issue by proposing a blockchain-based onion routing protocol for IoMVs, i.e., B-IoMV, to achieve secure, trusted, and anonymous D2D communication. We studied the working of onion routing and presented a blockchain and token-based solution to strengthen the security and anonymity of IoMVs. A blockchain-based solution is quite costly and we use InterPlanetary File System (IPFS) to make the proposed B-IoMV system cost-effective. Finally, results show that the proposed B-IoMV system achieved better performance in communication latency, data storage cost, and network bandwidth utilization.
... To improve the privacy and anonymity of the user over internet, composite secure tunnels such as the onion routing (TOR) protocols have been proposed. TOR is based on Chaum's notion of an anonymous channel [3]. Nested Tunnels or VPN chaining are other composite forms to increase security complexity, confidentiality and anonymity of the source of data. ...
Article
Full-text available
As a cost effective measure to attain security and confidentiality of data, Virtual Private Network (VPN) is used to interconnect two networks. The research shows that the protocols and algorithms of VPNs adds the overhead and in turn affect the network performance. The two end point hardware appliances are configured with standard configuration to establish site to site VPN. There are different data formats transferred via these tunnels. A research was conducted in a simulation environment of open source technology to identify the various factors impacting the performance of data transfer via VPN tunnels. Empirical measurement shows that performance depends critically on nature of data and compressibility in different internet bandwidth conditions. This was also noticed that nested VPN architecture adds complexity in security at the cost of multifold transmission delays. VPN provide security at the cost of performance; hence application specific cost benefit analysis is essential to choose the optimal architecture.
... For example, the authors in [15] discussed the OR method in an anonymous peer-topeer network to secure the user's identity utilizing the applied cryptography techniques. However, they have not explored the potential of OR protocol in real-time applications [16]. ...
Article
The rise of automation with machine-type communication (MTC) holds great potential in developing industrial internet of things (IIoT)-based applications such as smart cities, intelligent transportation systems (ITS), supply chains, and smart industries without any human intervention. However, MTC communication has to cope with significant security challenges due to heterogeneous data, public network connectivity, and inadequate security mechanism. To overcome the aforementioned issues, we have proposed a blockchain and garlic-routing-based secure data exchange framework, i.e., GRADE, that alleviates the security constraints and maintains the stable connection in the MTC communication. First, the long-short-term memory (LSTM)-based Nadam optimizer efficiently predicts the class label, i.e., malicious and non-malicious, and forwards the non-malicious data requests of the MTC communication to the garlic routing (GR) network. The GR network assigns a unique ElGamal encrypted session tag to each machine partaking in MTC communication. Then, an advanced encryption standard (AES) is applied to encrypt the MTC data requests. Further, the interplanetary file system (IPFS)-based blockchain is employed to store the machine's session tags, which increases the scalability of the proposed GRADE framework. Additionally, the proposed framework has utilized the indispensable benefits of the 6G network to enhance the network performance of the MTC communication. Lastly, the proposed GRADE framework is evaluated against different performance metrics such as scalability, packet loss, accuracy, and compromised rate of the MTC data request. The results show that the GRADE framework outperforms in terms of accuracy, i.e., 98.9%, compromised rate, i.e., 18.5%, scalability, i.e., 47.2%, and packet loss ratio, i.e., 24.3% when compared with the baseline methods.
... To improve the privacy and anonymity of the user over internet, composite secure tunnels such as the onion routing (TOR) protocols have been proposed. TOR is based on Chaum's notion of an anonymous channel [3]. Nested Tunnels or VPN chaining are other composite forms to increase security complexity, confidentiality and anonymity of the source of data. ...
Article
Full-text available
As a cost effective measure to attain security and confidentiality of data, Virtual Private Network (VPN) is used to interconnect two networks. The research shows that the protocols and algorithms of VPNs adds the overhead and in turn affect the network performance. The two end point hardware appliances are configured with standard configuration to establish site to site VPN. There are different data formats transferred via these tunnels. A research was conducted in a simulation environment of open source technology to identify the various factors impacting the performance of data transfer via VPN tunnels. Empirical measurement shows that performance depends critically on nature of data and compressibility in different internet bandwidth conditions. This was also noticed that nested VPN architecture adds complexity in security at the cost of multifold transmission delays. VPN provide security at the cost of performance; hence application specific cost
ResearchGate has not been able to resolve any references for this publication.