A Systematic Review of Anonymous Communication Systems

Ramzi A. Haraty, Maram Assi, Imad Rahal

2017

Abstract

Privacy and anonymity are important concepts in the field of communication. Internet users seek to adopt protective measures to ensure the privacy and security of the data transmitted over the network. Encryption is one technique to secure critical information and protect its confidentiality. Although there exist many encryption algorithms, hiding the identity of the sender can only be achieved through an anonymous network. Different classifications of anonymous networks exist. Latency level and system model architecture are two essential criteria. In this paper, we present a description of a set of anonymous systems including NetCamo, TOR, I2P and many others. We will show how these systems work and contrast the advantages and disadvantages of each one of them.

Download


Paper Citation


in Harvard Style

Haraty R., Assi M. and Rahal I. (2017). A Systematic Review of Anonymous Communication Systems . In Proceedings of the 19th International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-248-6, pages 211-220. DOI: 10.5220/0006216802110220

in Bibtex Style

@conference{iceis17,
author={Ramzi A. Haraty and Maram Assi and Imad Rahal},
title={A Systematic Review of Anonymous Communication Systems},
booktitle={Proceedings of the 19th International Conference on Enterprise Information Systems - Volume 2: ICEIS,},
year={2017},
pages={211-220},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006216802110220},
isbn={978-989-758-248-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 19th International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - A Systematic Review of Anonymous Communication Systems
SN - 978-989-758-248-6
AU - Haraty R.
AU - Assi M.
AU - Rahal I.
PY - 2017
SP - 211
EP - 220
DO - 10.5220/0006216802110220