Survey of Onion Routing Approaches: Advantages, Limitations and Future Scopes

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The rapid advancement of technology has led to the evolution of the Internet, which brought changes in the lives of humans drastically. Since then slowly, all the devices started connecting via the internet user has the freedom and ability to store the information and extract it when needed. But this requires the implementation of active security measures to ensure that the data is confidential and secured. Onion routing was implemented to secure the data from eavesdropping and traffic analysis which guarantees the security of data with the help of private keys. This paper presents a detailed analysis of onion routing algorithms and its variants based on the implementation, features, security concerns and weakness.

Cite

CITATION STYLE

APA

Chauhan, M., Singh, A. K., & Komal. (2020). Survey of Onion Routing Approaches: Advantages, Limitations and Future Scopes. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 49, pp. 686–697). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-43192-1_76

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free