Accomplishments

Simulation of Anonymity Network Model


  • Details
  • Share
Category
Articles
Authors
Omakr Ghaisas,Irfan Siddavatam ,Faruk Kazi & Ashwini Dalvi
Publisher
Beiesp
Publishing Date
01-May-2019
volume
8
Issue
7
Pages
1630-1635
  • Abstract

In order to protect privacy a user might want to be anonymous over internet. Tor is most used network when it comes to achieving internet anonymity. But Tor network itself is not secure. If tor network gets compromised then anonymity of Tor client will get compromised which means ip address of user’s computer will be noted at Website interface. Hence we have proposed a model which gives advance anonymity to the Tor client. The model consists of three components Local Host, Remote Terminal and Target Website. Due to inclusion of Remote Terminal even though Tor gets compromised only ip address of Remote Terminal gets noted at the website interface. Hence user’s ip address is never noted at web interface or user is anonymous. This paper provides simulation tests on anonymity model using shadow. In Simulation Results we have graphs which show different relationships between Benchmark parameter which are throughput, goodput, ticks, control overhead and retransmission overhead.

Apply Now Enquire Now