Wireless onion router

Source: Wikipedia, the free encyclopedia.

A wireless onion router is a

wireless module
or using its own inbuilt wireless module in the later versions.

It has transparent encryption for the application, the user does not have to think about how the data will be sent or received. The encrypted data includes the destination and origin IP address of the data and the current relay point only knows the previous and the next hop of the encrypted packet. These relay points are selected in a random order and can only decrypt a single layer before forwarding it to the next hop where is the procedure is followed unless it is the destination point.

Applications

A wireless router which can use the onion router network can be used to keep the user safe from

access
that allows it to be placed at a site and users can get connected.

Tor can be used in security focused Operating Systems, messengers, browsers. These can be anonymised using Tor network.

Weaknesses

A wireless onion router works on the Tor network and shares the same weaknesses, as mentioned in the

Tor page. The University of Michigan has created a scanner capable of scanning almost 90% of bridges that are live in a single scan.[4]
The packets that transferred using Tor also are slow because of the increased amount of hops with encryption and decryption.

Anonymous System (Eavesdropping)

Anonymous systems if exists on both ends of the network, exit relay and entry relay can sniff the packets and statistically correlate the traffic which can point out the destination or the source address of the packet.[5] This also includes eavesdropping at the exit nodes of the network. The data that is between the exit node and the destination server is not encrypted. These data packets can be captured easily.[6] This captured data can reveal the source information, and as suggested by Egersta these nodes are costly to run and require a lot of bandwidth which could suggest that some intelligence agencies might be running them.[7] There have been tested techniques with one third of control nodes to compromise the Tor network.[8]

Traffic Analysis

Articles have been proposed which with some partial knowledge of the network give away which nodes are being used to relay the packets which reduces the anonymity provided by the network.[9] Another techniques which shows relations between streams and then can be linked back to the initiator are available, this technique however does not reveal the source.[9]

IP Exposing Protocols

Some protocols can be used to expose the IP address using tor dissimulation procedures. Some of the examples are Inspection of control messages of BitTorrent,[10] Hijacking responses of the trackers,[10] exploitation of distributed hash tables.[10]

References

  1. OCLC 728101720.{{cite book}}: CS1 maint: others (link
    )
  2. ^ "Torstatus".
  3. ^ "torproject".
  4. ^ "Zmap Internet Scan Zero Day". 2013-08-20.
  5. OCLC 812608077.{{cite book}}: CS1 maint: others (link
    )
  6. ^ Zetter, Kim. "Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise". WIRED. Retrieved 2017-10-13.
  7. ^ "The hack of the year - Security - Technology - smh.com.au". www.smh.com.au. 2007-11-13. Retrieved 2017-10-13.
  8. ^ "Tor anonymizing network Compromised by French researchers". The Hacker News. Retrieved 2017-10-13.
  9. ^
    S2CID 14029551
    .
  10. ^
    CiteSeerX 10.1.1.167.5679. {{cite journal}}: Cite journal requires |journal= (help
    )

External links