Survey of research on Tor-based anonymous networking technologies

In recent years, with the continuous development of network attack techniques, anonymous network technologies represented by Tor have faced performance bottlenecks and security challenges. To this end, a systematic review of the Tor anonymity communication mechanism, as well as its performance and s...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHU Yufei, HU Yuxiang, CHEN Bo, SHEN Juan, CUI Pengshuai, YUAN Zheng, TIAN Le
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2025-05-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2025077
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850224112103849984
author ZHU Yufei
HU Yuxiang
CHEN Bo
SHEN Juan
CUI Pengshuai
YUAN Zheng
TIAN Le
author_facet ZHU Yufei
HU Yuxiang
CHEN Bo
SHEN Juan
CUI Pengshuai
YUAN Zheng
TIAN Le
author_sort ZHU Yufei
collection DOAJ
description In recent years, with the continuous development of network attack techniques, anonymous network technologies represented by Tor have faced performance bottlenecks and security challenges. To this end, a systematic review of the Tor anonymity communication mechanism, as well as its performance and security issues, has been conducted with a focus on the sender anonymity in the Tor network. First, key mechanisms, including the directory protocol, path selection, and circuit construction were analyzed to identify major issues in existing research, and corresponding optimization methods and improvement directions were summarized. Next, typical de-anonymization attacks, including both active and passive methods, were systematically reviewed, and the effectiveness of defense strategies against these attacks were analyzed. Finally, Tor’s limitations in terms of anonymity, security and performance were thoroughly examined, optimization strategies were summarized, and future research directions in the development of anonymous network technologies were prospected.
format Article
id doaj-art-83a7e49c344b4fcfbc41568b49e60bb4
institution OA Journals
issn 1000-436X
language zho
publishDate 2025-05-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-83a7e49c344b4fcfbc41568b49e60bb42025-08-20T02:05:43ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2025-05-0146218237108583665Survey of research on Tor-based anonymous networking technologiesZHU YufeiHU YuxiangCHEN BoSHEN JuanCUI PengshuaiYUAN ZhengTIAN LeIn recent years, with the continuous development of network attack techniques, anonymous network technologies represented by Tor have faced performance bottlenecks and security challenges. To this end, a systematic review of the Tor anonymity communication mechanism, as well as its performance and security issues, has been conducted with a focus on the sender anonymity in the Tor network. First, key mechanisms, including the directory protocol, path selection, and circuit construction were analyzed to identify major issues in existing research, and corresponding optimization methods and improvement directions were summarized. Next, typical de-anonymization attacks, including both active and passive methods, were systematically reviewed, and the effectiveness of defense strategies against these attacks were analyzed. Finally, Tor’s limitations in terms of anonymity, security and performance were thoroughly examined, optimization strategies were summarized, and future research directions in the development of anonymous network technologies were prospected.http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2025077Tor networkanonymous networknetwork securitysecurity technologyperformance optimization
spellingShingle ZHU Yufei
HU Yuxiang
CHEN Bo
SHEN Juan
CUI Pengshuai
YUAN Zheng
TIAN Le
Survey of research on Tor-based anonymous networking technologies
Tongxin xuebao
Tor network
anonymous network
network security
security technology
performance optimization
title Survey of research on Tor-based anonymous networking technologies
title_full Survey of research on Tor-based anonymous networking technologies
title_fullStr Survey of research on Tor-based anonymous networking technologies
title_full_unstemmed Survey of research on Tor-based anonymous networking technologies
title_short Survey of research on Tor-based anonymous networking technologies
title_sort survey of research on tor based anonymous networking technologies
topic Tor network
anonymous network
network security
security technology
performance optimization
url http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2025077
work_keys_str_mv AT zhuyufei surveyofresearchontorbasedanonymousnetworkingtechnologies
AT huyuxiang surveyofresearchontorbasedanonymousnetworkingtechnologies
AT chenbo surveyofresearchontorbasedanonymousnetworkingtechnologies
AT shenjuan surveyofresearchontorbasedanonymousnetworkingtechnologies
AT cuipengshuai surveyofresearchontorbasedanonymousnetworkingtechnologies
AT yuanzheng surveyofresearchontorbasedanonymousnetworkingtechnologies
AT tianle surveyofresearchontorbasedanonymousnetworkingtechnologies