Engineering:Wireless onion router

From HandWiki
Short description: Router that uses Tor to connect securely to a network

A wireless onion router is a router that uses Tor to connect securely to a network. The onion router[1] allows the user to connect to the internet anonymously creating an anonymous connection. Tor works using an overlaid network which is free throughout the world, this overlay network is created by using numerous relay[2] points created using volunteer which helps the user hide personal information behind layers of encrypted data like layers of an onion. Routers are being created using Raspberry Pi adding a wireless module or using its own inbuilt wireless module in the later versions.

This router provides encryption at the seventh layer (application layer) of the OSI model, which makes it transparent encryption, the user does not have to think about how the data will be sent or received. The encrypted data includes the destination and origin IP address of the data and the current relay point only knows the previous and the next hop of the encrypted packet. These relay points are selected in a random order and can only decrypt a single layer before forwarding it to the next hop where is the procedure is followed unless it is the destination point.

Applications

A wireless router which can use the onion router network can be used to keep the user safe from hackers or network sniffers. The data captured by them won't make any sense as it will only look like messed up text. These are small and handy which will give the user a freedom to carry this tool and connect to the network from anywhere. This setup does not require installation of Tor browser on the work station. Whistle blowers and NGO workers use this network to pass information or to talk to their family without disclosing any information.[3] The applications of wireless onion router are common to a normal router, it provides access that allows it to be placed at a site and users can get connected.

Tor can be used in security focused Operating Systems, messengers, browsers. These can be anonymised using Tor network.

Weaknesses

A wireless onion router works on the Tor network and shares the same weaknesses, as mentioned in the Tor page. The University of Michigan has created a scanner capable of scanning almost 90% of bridges that are live in a single scan.[4] The packets that transferred using Tor also are slow because of the increased amount of hops with encryption and decryption.

Anonymous System (Eavesdropping)

Anonymous systems if exists on both ends of the network, exit relay and entry relay can sniff the packets and statistically correlate the traffic which can point out the destination or the source address of the packet.[5] This also includes eavesdropping at the exit nodes of the network. The data that is between the exit node and the destination server is not encrypted. These data packets can be captured easily.[6] This captured data can reveal the source information, and as suggested by Egersta these nodes are costly to run and require a lot of bandwidth which could suggest that some intelligence agencies might be running them.[7] There have been tested techniques with one third of control nodes to compromise the Tor network.[8]

Traffic Analysis

Articles have been proposed which with some partial knowledge of the network give away which nodes are being used to relay the packets which reduces the anonymity provided by the network.[9] Another techniques which shows relations between streams and then can be linked back to the initiator are available, this technique however does not reveal the source.[9]

IP Exposing Protocols

Some protocols can be used to expose the IP address using tor dissimulation procedures. Some of the examples are Inspection of control messages of BitTorrent,[10] Hijacking responses of the trackers,[10] exploitation of distributed hash tables.[10]

References

  1. Traffic monitoring and analysis : third international workshop, TMA 2011, Vienna, Austria, April 27, 2011 : proceedings. Domingo-Pascual, J. (Jordi), 1958-, Shavitt, Yuval., Uhlig, Steve.. Berlin: Springer. 2011. ISBN 9783642203046. OCLC 728101720. 
  2. "Torstatus". http://torstatus.blutmagie.de. 
  3. "torproject". https://www.torproject.org/about/overview.html.en. 
  4. "Zmap Internet Scan Zero Day". 2013-08-20. http://www.silicon.co.uk/workspace/zmap-internet-scan-zero-day-125374. 
  5. Proceedings, 2012 IEEE Symposium on Security and Privacy, S & P 2012 : 21-23 May 2012, San Francisco, California, USA.. IEEE Computer Society.. Los Alamitos, Calif.: IEEE Computer Society. 2012. ISBN 9780769546810. OCLC 812608077. 
  6. Zetter, Kim. "Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise" (in en-US). WIRED. https://www.wired.com/2007/09/rogue-nodes-turn-tor-anonymizer-into-eavesdroppers-paradise/?currentPage=all. Retrieved 2017-10-13. 
  7. "The hack of the year - Security - Technology - smh.com.au" (in en). 2007-11-13. http://www.smh.com.au/news/security/the-hack-of-the-year/2007/11/12/1194766589522.html?page=fullpage#contentSwap2. 
  8. "Tor anonymizing network Compromised by French researchers" (in en-US). The Hacker News. https://thehackernews.com/2011/10/tor-anonymizing-network-compromised-by.html. 
  9. 9.0 9.1 Murdoch, S. J.; Danezis, G. (May 2005). "Low-Cost Traffic Analysis of Tor". 2005 IEEE Symposium on Security and Privacy (S&P'05). pp. 183–195. doi:10.1109/sp.2005.12. ISBN 978-0-7695-2339-2. 
  10. 10.0 10.1 10.2 Download Limit Exceeded. 

External links