Academic Journals Database
Disseminating quality controlled scientific knowledge

Desing and Implementation of Distributed Security using Onion Routing

Author(s): Ashish T. Bhole | Savita H. Lambole

Journal: International Journal of Computer Applications
ISSN 0975-8887

Volume: icwet;
Issue: 3;
Date: 2012;
Original page

Keywords: Anonymous communication | Onion routing | Anonymity | TOR | Security | Cryptography | RSA | OR

Although methods for reaching security goals such as secrecy, integrity and authentication are widely used in the Internet, there is no widely-used solution providing anonymity. Onion Routing is a flexible communication infrastructure and one such application which enables users to have anonymous communication and yet is so reliable from eavesdroppers and traffic analyzers. First it securely establishes the connection. To ensure the security well known networking and Public key Cryptographic techniques are utilized. Here the identities of the sender and the receiver are hidden by an onion structure, which is cryptographically layered data structure that defines the route through the onion routing network. After the route is established by making the entries into the routing table, the data is transmitted over the channel, which is also repeatedly encrypted. Once the data is transferred the connection is destroyed. Onion routing provides the efficient way of protection, which we have implemented.

Tango Rapperswil
Tango Rapperswil

     Save time & money - Smart Internet Solutions