Thus, the client has established a path with three nodes, and with each node has negotiated an encryption (session) key. The way the circuit is extended to include the exit relay is the same used to extend the circuit in the previous step. Finally, the client extends the circuit to the third relay (step 4), the exit relay, which will be used to send the client’s traffic to the website. In this process, the client negotiates a key with the middle relay in the same way he did it with the entry guard. Next, the client requests the entry guard to extend the circuit to the middle relay (step 3). The information exchanged in the circuit is based on a data structure named cell, whose size is fixed at 512 bytes. For creating this circuit, a TLS connection between the client and the entry guard is established where they negotiate, using a Diffie–Hellman handshake, a key to exchanging information within the TLS connection. This is an incremental process where the client, first, creates a circuit with the entry guard (step 2). The process of building the circuit is summed up next. This review has been developed from a selection of 57 articles and presents main findings and advances regarding Tor hidden services, limitations found, and future issues to be investigated. In this article, we present a systematic literature review that aims to offer a comprehensive overview of the research made on THS by presenting the state-of-the-art and the different research challenges to be addressed. However, there is a lack of reviews that sum up the main findings and research challenges. THS is an important research field in Tor. Among them, we can mention that Tor can hide a user’s IP address when accessing to a service such as the Web, and it also supports Tor hidden services (THS) (now named onion services) as a mechanism to conceal the server’s IP address, used mainly to provide anonymity to websites. This anonymous communication network provides some interesting features. The most famous anonymous communication network is Tor. Anonymous communications networks were created to protect the privacy of communications, preventing censorship and traffic analysis.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |