Survey of research on Tor-based anonymous networking technologies
In recent years, with the continuous development of network attack techniques, anonymous network technologies represented by Tor have faced performance bottlenecks and security challenges. To this end, a systematic review of the Tor anonymity communication mechanism, as well as its performance and s...
Saved in:
| Main Authors: | , , , , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2025-05-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2025077 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850224112103849984 |
|---|---|
| author | ZHU Yufei HU Yuxiang CHEN Bo SHEN Juan CUI Pengshuai YUAN Zheng TIAN Le |
| author_facet | ZHU Yufei HU Yuxiang CHEN Bo SHEN Juan CUI Pengshuai YUAN Zheng TIAN Le |
| author_sort | ZHU Yufei |
| collection | DOAJ |
| description | In recent years, with the continuous development of network attack techniques, anonymous network technologies represented by Tor have faced performance bottlenecks and security challenges. To this end, a systematic review of the Tor anonymity communication mechanism, as well as its performance and security issues, has been conducted with a focus on the sender anonymity in the Tor network. First, key mechanisms, including the directory protocol, path selection, and circuit construction were analyzed to identify major issues in existing research, and corresponding optimization methods and improvement directions were summarized. Next, typical de-anonymization attacks, including both active and passive methods, were systematically reviewed, and the effectiveness of defense strategies against these attacks were analyzed. Finally, Tor’s limitations in terms of anonymity, security and performance were thoroughly examined, optimization strategies were summarized, and future research directions in the development of anonymous network technologies were prospected. |
| format | Article |
| id | doaj-art-83a7e49c344b4fcfbc41568b49e60bb4 |
| institution | OA Journals |
| issn | 1000-436X |
| language | zho |
| publishDate | 2025-05-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-83a7e49c344b4fcfbc41568b49e60bb42025-08-20T02:05:43ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2025-05-0146218237108583665Survey of research on Tor-based anonymous networking technologiesZHU YufeiHU YuxiangCHEN BoSHEN JuanCUI PengshuaiYUAN ZhengTIAN LeIn recent years, with the continuous development of network attack techniques, anonymous network technologies represented by Tor have faced performance bottlenecks and security challenges. To this end, a systematic review of the Tor anonymity communication mechanism, as well as its performance and security issues, has been conducted with a focus on the sender anonymity in the Tor network. First, key mechanisms, including the directory protocol, path selection, and circuit construction were analyzed to identify major issues in existing research, and corresponding optimization methods and improvement directions were summarized. Next, typical de-anonymization attacks, including both active and passive methods, were systematically reviewed, and the effectiveness of defense strategies against these attacks were analyzed. Finally, Tor’s limitations in terms of anonymity, security and performance were thoroughly examined, optimization strategies were summarized, and future research directions in the development of anonymous network technologies were prospected.http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2025077Tor networkanonymous networknetwork securitysecurity technologyperformance optimization |
| spellingShingle | ZHU Yufei HU Yuxiang CHEN Bo SHEN Juan CUI Pengshuai YUAN Zheng TIAN Le Survey of research on Tor-based anonymous networking technologies Tongxin xuebao Tor network anonymous network network security security technology performance optimization |
| title | Survey of research on Tor-based anonymous networking technologies |
| title_full | Survey of research on Tor-based anonymous networking technologies |
| title_fullStr | Survey of research on Tor-based anonymous networking technologies |
| title_full_unstemmed | Survey of research on Tor-based anonymous networking technologies |
| title_short | Survey of research on Tor-based anonymous networking technologies |
| title_sort | survey of research on tor based anonymous networking technologies |
| topic | Tor network anonymous network network security security technology performance optimization |
| url | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2025077 |
| work_keys_str_mv | AT zhuyufei surveyofresearchontorbasedanonymousnetworkingtechnologies AT huyuxiang surveyofresearchontorbasedanonymousnetworkingtechnologies AT chenbo surveyofresearchontorbasedanonymousnetworkingtechnologies AT shenjuan surveyofresearchontorbasedanonymousnetworkingtechnologies AT cuipengshuai surveyofresearchontorbasedanonymousnetworkingtechnologies AT yuanzheng surveyofresearchontorbasedanonymousnetworkingtechnologies AT tianle surveyofresearchontorbasedanonymousnetworkingtechnologies |