Journal of Information Processing
Online ISSN : 1882-6652
ISSN-L : 1882-6652
 
Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models
Fei FengKanta Matsuura
Author information
JOURNAL FREE ACCESS

2015 Volume 23 Issue 5 Pages 646-654

Details
Abstract

Tor is the most popular anonymous communication tool in the world. Its anonymity, however, has not been thoroughly evaluated. For example, it is possible for an adversary to restrict access to the Tor network by blocking all the publicly listed relays. In response, Tor utilizes bridges, which are unlisted relays, as alternative entry points. However, the vulnerabilities of the current bridge mechanism have not been thoroughly investigated yet. We first investigate the vulnerabilities of the current bridge mechanism under different adversarial models. Then we compare the current bridge mechanism with our two proposals and discuss their effects on the security and performance of Tor.

Content from these authors
© 2015 by the Information Processing Society of Japan
Previous article Next article
feedback
Top