TOR vs I2P: A comparative study

The Internet is the main source of communication now-a-days; however, the identities of senders and receivers are not hidden. If someone wants to hide his/her identity, the most suitable choice is to use anonymous communication. Anonymous communication not only provides anonymity but also privacy. Anonymity is not something which was invented with the Internet. To overcome this and provide anonymity, anonymous communication systems were developed. In this paper a comparison of The Onion Router and Invisible Internet Project is presented. The Onion Router is the most deployed anonymous communication system that provides online anonymity and privacy while The Invisible Internet Project allows applications to send messages to each other pseudonymously and securely by using garlic routing.

[1]  Eric C. Price,et al.  Browser-Based Attacks on Tor , 2007, Privacy Enhancing Technologies.

[2]  Hannes Federrath,et al.  Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[3]  Prateek Mittal,et al.  ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies , 2009, CCS.

[4]  U Moeller,et al.  Mixmaster Protocol Version 2 , 2004 .

[5]  Ramzi A. Haraty,et al.  A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous systems , 2015, Comput. Hum. Behav..

[6]  Ramzi A. Haraty,et al.  The TOR data communication system: A survey , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).

[7]  Ramzi A. Haraty,et al.  I2P Data Communication System , 2011, ICON 2011.

[8]  Philip S. Yu,et al.  Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering , 2006, Sixth International Conference on Data Mining (ICDM'06).

[9]  Robert Tappan Morris,et al.  Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.

[10]  Rahul Desai,et al.  MANET with Q Routing Protocol , 2013 .

[11]  Paul F. Syverson A peel of onion , 2011, ACSAC '11.

[12]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[13]  Ramzi A. Haraty,et al.  The TOR data communication system , 2014, Journal of Communications and Networks.

[14]  George Danezis,et al.  Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..