logo

Processing of Onion Router

   

Added on  2020-05-16

7 Pages1051 Words57 Views
ONION ROUTING
Processing of Onion Router_1
ContentsWhat is onion routing? Explain with Its working?..........................................................................2How cyber-crime uses onion routing for its benefit?......................................................................4Bibliography....................................................................................................................................5
Processing of Onion Router_2
What is onion routing? Explain with Its working?The onion routing is considered as one of the best technique to handle the communication in the network. This network handles the transfer of messages which are encapsulated in encrypted layers. With this, the encrypted data is then handled through the different series of the nodal networks which are considered to be the onion routers. Each layer peels away a layer that leads to the uncovering of the next destination of the data. The sender, is till then anonymous mainly because the intermediary only works on the locations which tends to precede and follow the nodes1. To understand the concept of the same, there is a use of proxy servers which tend to relaythe connection through the server. This tend to add the step in the path of data packets as well. With this, the proxy servers are not anonymous rather they are for handling the traffic that mainly passes through so that they can actually point back, as and when need. The activities are defined with the latency in the connection where the proxy service tends to hit the IP informationas well. 1Chen, C., Asoni, D.E., Barrera, D., Danezis, G. and Perrig, A., 2015, October. HORNET: High-speed onion routing at the network layer. InProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security(pp. 1441-1454). ACM.
Processing of Onion Router_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(Sample) The Onion Routing
|6
|1617
|106

Network and Communication: Data Flow, IP Routing, Frame Forwarding, and Data Acknowledgment Exchange
|9
|2090
|356

Hybrid Encryption
|4
|798
|8

Network Assignment: NAT, ARP, Routing Protocols and TCP
|8
|1411
|461

Assignment on Internetworking With TCP/IP
|6
|1279
|22

VPN Applications and Significance
|8
|1128
|307