The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Lightweight Anti-Censorship Online Network for

#
   The Onion Router (TOR) online anonymity system is a network of volunteer’s nodes that allows Internet users to be anonymous through consecutive encryption tunnels. N odes are selected according to estimated bandwidth (bnd) values announced by the nodes themselves. Some nodes may a nnounce false values due to a lack of accuracy or hacking intention. Furthermore, a network bottleneck may occur when ru nning TOR in countries with low Internet speed. In this paper, we highlight the censorship challenges that Internet u sers face when using anti,censorship tools in such countries. We show that the current anti,censorship solutions having limita tions when implemented in countries with extensive internet filtering and low Internet speed. In order to overcome such limit ations, we propose a new anonymity online solution based on TOR. The network nodes are selected using a trust based syst em. Most encryption and path selection computation overhead are shifted to our network nodes. We also provide a new encrypt ion framework where the nodes with higher bnd and r esources are chosen and verified carefully according to specific metrics. We use an atomic encryption between entry and Exit nodes (Ex) without revealing the secret components of each par ty. We demonstrate that our solution can provide anonymous browsing in countries with slow internet as well as fewer bottl enecks.  


[1] Ancillotti E., Bruno R., and Conti M., An Efficient Routing Protocol for Point7to7Point Elastic Traffic in Wireless Mesh Networks, in Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks , Lucca, Italian, pp. 176, 2011.

[2] Blaze M., Bleumer G., and Strauss M., Divertible Protocols and Atomic Proxy Cryptography, in Proceedings International Conference on the Theory and Application of Cryptographic Techniques , pp. 1277144, 1998.

[3] Dan B. and Matthew K., Identity7Based Encryption from the Weil Pairing7 Advances in Cryptology, in Proceedings of 21 st Annual International Cryptology Conference , California, USA, pp. 2137229, 2001. (15) Lightweight Anti,Censorship Online Network for Anonymity and Privacy in Middle Eastern Countries 657

[4] Danezis G., Dingledine R., and Mathewson N., Mixminion: Design of a Type III Anonymous Remailer Protocol, in Proceedings of Symposium on Security and Privacy , UK, pp. 27 15, 2003.

[5] Dierks T. and Rescorla E., The Transport Layer Security (TLS) Protocol, available at: http://tools.ietf.org/html/rfc5246, last visited 2008.

[6] Dingledine R., Mathewson N., and Syverson P., TOR: The Second Generation Onion Router , in Proceedings of the 13 th Conference on USENIX Security Symposium , USA, pp. 21731, 2004.

[7] Eric W, Scott W, Ian G and Halderman A., Telex: Anticensorship in the Network Infrastructure, available at: https://www.usenix.org/legacy/event/sec11/tech/f ull_papers/Wustrow.pdf, last visited 2011

[8] Fu X., Zhu Y., Graham B., Bettati R., and Zhao W., On Flow Marking Attacks in Wireless Anonymous Communication Networks, in Proceedings of the 25 th IEEE International Conference on Distributed Computing Systems, USA, pp. 4937503, 2005.

[9] Telecomix., available at: http://telecomix.org/, last visited 2015.

[10] Karsten L., What Fraction of our Bridges are not Reporting Usage Statistics?, available at: https://metrics.torproject.org/, last visited 2015 .

[11] Liao M., Luo M., Yang C., Chen C., Wu C., and Chen Y., Design and Evaluation of Deep Packet Inspection System: A Case Study, Networks, IET , vol. 1, no. 1, pp. 279, 2012

[12] Mingming H., Qin Z., Kuramoto M., Cho F., and Lunyong Z., Research and Implementation of Layer Two Tunneling Protocol (L2TP) on Carrier Network, in Proceedings of the 4 th IEEE International Conference on Broadband Network and Multimedia Technology , Shenzhen, China, pp.80783, 2011.

[13] PR Newswire, Blue Coat Delivers High7 Performance Web Filtering Using ISS Proventia Web Filter Technology, available at: http://www.prnewswire.com, last visited 2015.

[14] Reed M., Syverson, P., and Goldschlag D., Anonymous Connections and Onion Routing, Selected Areas in Communications, IEEE Journal on Selected Areas in Communications , vol.16, no. 4, pp. 4827494, 1998

[15] Ronald D., John P., Rafal R., and Jonathan Z., Access Denied: The Practice and Policy of Global Internet Filtering, Information Revolution and Global Politics , 2008.

[16] Syverson P., Tsudik G., Reed M., and Landwehr C., Towards an Analysis of Onion Routing Security, available at: http://www.dtic.mil/dtic/tr/fulltext/u2/a465255.p df, last visited 2001.

[17] TOR Project: OBFSPROXY, available at: https://www.torproject.org/projects/obfsproxy.h ml, last visited 2015.

[18] Yu H., Towards Secure Strong Designated Verifier Signature Scheme from Identity7based Systems, the International Arab Journal of Information Technology , vol. 11, no. 4, pp. 3157 321, 2014.

[19] Weaver A., Secure Sockets Layer, The IEEE International Conference on Computer , Virginia, USA, vol. 39, no. 4, pp. 88790, 2006. Tameem Eissa received his BS and MSc degrees in computer engineering from Aleppo University in 2005 and 2007 respectively, and PhD degree in computer science from UTM, Malaysia, in 2012. He is now a Post Doctor research fellow in Chonbuk National University. His research interests include wireless network and cloud computing security. Gihwan Cho received his BSc and Msc degrees in computer science and statistics from Chonnam National University and Seoul National University in 1985 and 1987 respectively, and PhD degree in computer science from University of Newcastle, England, in 1996. Currently, he is a professor at the Division of Electronic and Informa tion Engineering at Chonbuk National University, Jeonju, S. Korea. His research interests include mobile computing, wireless sensor network, information security, computer communication and wireless security.