summary, Tor is made up of a collection of onion
routers where each one sends information in a secure
way to the next hop. Any client can become a server
acting as a Tor onion router. To ensure
camouflaging the type of data being transferred, data
is sent in encrypted format with fixed size packets
called cells which are relayed without revealing their
content or their complete route. This is achieved
through cell encapsulation and multilevel
encryption.
To start communication, the client contacts a Tor
management node which maintains the list of bridge
nodes which accept connections for which a specific
handshake occurs. When the client determines the
participating nodes, it sends a “create” cell to each
of them without allowing any of them to know the
presence of the other.
One of the disadvantages of Tor resulting from
its architecture is that the central directory
containing the list of servers is often a target for the
attackers. Another problem with Tor is that it serves
a large number of users, therefore the use of a
limited number of servers to build an anonymous
path will which leads to performance issues. In
addition, users must keep track of all the available
servers, especially when the number of servers
becomes large as this may cause a deterioration of
performance due to bandwidth contention.
3. I2P, known as Invisible Internet Project is a
low latency anonymizing mix network. Its main
scope is anonymous file-sharing and web hosting
(Timpanaro, 2014). I2P presents some similarities
with tor however, a major difference between the
two can lies in the fact that tor focuses on hiding the
anonymity of the sender, while I2P also hides the
identity of the receiver (Erdin, 2015). It operates on
the network layer. One main characteristic of this
system is that it distinguishes between user online
identity and its geographical location. In fact, the
user is not identified by its IP address and port
number but by another identifier independent of its
location. I2P is message based instead of circuit
based. It is a fully distributed system for anonymous
P2P communications and not browsing which does
not rely on centralized directory servers. Previously
encrypted onion cells are grouped together with
extra padding as well as delay/no-delay instructions
to other I2P nodes and then packaged in so called
garlic cloves which are passed in encrypted format.
The system uses different types of cryptographic
algorithms. I2P is portrayed in figure 3.
4. Crowds is a proposed anonymity system for
web transactions. It allows users to surf the web
anonymously as shown in figure 4. It is named for
the notion of “blending into a crowd” where users
are grouped into a large and geographically diverse
group. Requests are then issued by the group on
behalf of its members, thus web servers will not be
able to know the exact source of a request as it might
have been issued from any of the crowd members.
Even members of the same crowd cannot
differentiate between the originator of a request and
a member that is only forwarding the request. Each
participant in the group is simultaneously protected
and protects other user as well. Therefore each
participant is playing the role of a proxy (Sui, 2003).
5. Based on Chaum’s mix approach, Tarzan is yet
another low-latency anonymous communication
system (see figure 5). Its main goal is to offer
anonymity for different applications including
instant messaging and web applications. It is a
decentralized P2P anonymous network that provides
IP service which makes it general purpose and
transparent to applications. Each node in the Tarzan
model can be both the client and the relay. It
supports layered encryption and multilevel routing
where a client chooses a path of peers in a restricted
way that protects communication against
adversaries. It also uses a protocol to ensure
unbiased selection of peers. Its cover traffic
mechanism offers protection against traffic analysis
of message volume or content, against message
flooding, and against DoS attacks.
Nodes participating in the communication run
software that discovers other participating nodes,
intercepts packets generated by local applications
that should be anonymized, manages tunnels through
chains of other nodes to anonymize these packets,
forwards packets to implement other nodes’ tunnels,
and operates a NAT (network address translator) to
forward other participants’ packets onto the ordinary
Internet. Therefore, the receiver is not necessary
belongs to the Tarzan network.
6. FreeNet is decentralized P2P network
application for storage and retrieval of files in such a
way that protects the anonymity of both senders and
receivers. The system works as a location-
independent distributed file system where many
individual computers that cooperate in routing the
requests.
Nodes participating in the Freenet network
provide their data storage to the network. Each node
maintains its own data store that it makes available
to the network and a routing table which contains the
addresses of other nodes. Requests are passed
through a series of proxys where every node locally