Waiting for anonymity: Understanding delays in the tor overlay

Prithula Dhungel, Moritz Steiner, Ivica Rimac, Volker Hilt, Keith W. Ross

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which are sensitive to latency, it is critical to reduce delays in Tor. To take an important step in this direction, we seek an in-depth understanding of delays in Tor. By taking snapshots of the entire Tor network within a short time window, we are able to study the delay distribution of the entire router population. We also monitor delays introduced by individual Tor routers over extended periods of time. Our results indicate that apart from delays introduced by routers, overlay network latency also plays a significant role in delays in Tor. We have also observed that at any time, there exist huge differences in the delays introduced by different routers. Our results reveal key performance characteristics of Tor system behavior and provide valuable insights for improving the Tor performance

    Original languageEnglish (US)
    Title of host publication2010 IEEE 10th International Conference on Peer-to-Peer Computing, P2P 2010 - Proceedings
    DOIs
    StatePublished - 2010
    Event2010 IEEE 10th International Conference on Peer-to-Peer Computing, P2P 2010 - Delft, Netherlands
    Duration: Aug 25 2010Aug 27 2010

    Publication series

    Name2010 IEEE 10th International Conference on Peer-to-Peer Computing, P2P 2010 - Proceedings

    Other

    Other2010 IEEE 10th International Conference on Peer-to-Peer Computing, P2P 2010
    Country/TerritoryNetherlands
    CityDelft
    Period8/25/108/27/10

    ASJC Scopus subject areas

    • Computational Theory and Mathematics
    • Computer Science Applications
    • Theoretical Computer Science

    Fingerprint

    Dive into the research topics of 'Waiting for anonymity: Understanding delays in the tor overlay'. Together they form a unique fingerprint.

    Cite this