The rapid advancement of technology has led to the evolution of the Internet, which brought changes in the lives of humans drastically. Since then slowly, all the devices started connecting via the internet user has the freedom and ability to store the information and extract it when needed. But this requires the implementation of active security measures to ensure that the data is confidential and secured. Onion routing was implemented to secure the data from eavesdropping and traffic analysis which guarantees the security of data with the help of private keys. This paper presents a detailed analysis of onion routing algorithms and its variants based on the implementation, features, security concerns and weakness.
CITATION STYLE
Chauhan, M., Singh, A. K., & Komal. (2020). Survey of Onion Routing Approaches: Advantages, Limitations and Future Scopes. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 49, pp. 686–697). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-43192-1_76
Mendeley helps you to discover research relevant for your work.