Anonymity Network Tor and Performance Analysis of ARANEA; an IOT Based Privacy-Preserving Router

by   AKM Bahalul Haque, et al.

There was a time when the word security was only confined to the physical protection of things that were valuable which must be guarded against all the odds. Today, in a world where people can do things virtually have emerged the necessity to protect the virtual world. Every single facet of our life is being controlled by the internet one way or another. There is no privacy in the cyberspace as the data which we are browsing on the internet is being monitored on the other side by someone. Each work we are doing on the internet is getting tracked or the data are getting leaked without consent. To browse the internet securely we developed a router named Aranea which relates to the browser Tor. Tor gives traffic anonymity and security. The Tor browser can be used in both positive and negative purpose. Tor encrypts data, it hides the location and identity of the user, it hides the IP address of the device, it hides the network traffic and many more. By using Tor browser each user can browse the internet safely in the cyber world. Our goal is to create an additional security bridge through the router Aranea for every user so that each user can simply browse the internet anonymously.



There are no comments yet.


page 2

page 5

page 6

page 14


A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation

The number and variety of Internet-connected devices have grown enormous...

Security and Privacy Analyses of Internet of Things Toys

This paper investigates the security and privacy of Internet-connected c...

Portable Tor Router: Easily Enabling Web Privacy for Consumers

On-line privacy is of major public concern. Unfortunately, for the avera...

Video or Image Transmission Security for ESP-EYE IoT device used in Business Processes

Internet of Things is the name of a communication network that is formed...

Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains

Blockchains are turning into decentralized computing platforms and are g...

A Privacy-Preserving Data Inference Framework for Internet of Health Things Networks

Privacy protection in electronic healthcare applications is an important...

Nowhere to Hide: Cross-modal Identity Leakage between Biometrics and Devices

Along with the benefits of Internet of Things (IoT) come potential priva...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.