Reference : Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Perfo...
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/12974
Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance
English
Ries, Thorsten mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Panchenko, Andriy mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
State, Radu mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC)]
Engel, Thomas mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
2011
Ninth Australasian Information Security Conference
ACS
Volume 116
77-86
Yes
International
978-1-920682-96-5
Ninth Australasian Information Security Conference (AISC)
from 17-01-2011 to 21-01-2011
Perth
Australia
[en] The most popular system for providing practical low-latency anonymity on the Internet is Tor. However, many other tools besides Tor exist as both free and commercial solutions. In this paper, we consider five most popular low-latency anonymisation services that represent the current state of the art: single-hop proxies (Perfect Privacy and free proxies) and Onion Routing based solutions (Tor, I2P, and Jon-Donym). We assess their usability and rank them in regard to their anonymity. We also assess their efficiency and reliability. To this end, we define a set of metrics and present extensive measurements based on round-trip time, inter-packet delay variation and throughput. Apart from the technical realization, economic aspects are also crucial for anonymous communication systems. In order to attract more users, which is mandatory in order to improve anonymity per se, systems need to exhibit a certain payoff. We therefore define an economic model that takes all relevant aspects into consideration. In this paper, we describe the results obtained, lessons learned, and provide guidance for selecting the most appropriate system with respect to a set of requirements.
http://hdl.handle.net/10993/4704
116
<br />Australasian Information Security Conference (AISC 2011)

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
CRPITV116Ries.pdfPublisher postprint4.85 MBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.