2011 IEEE 36th Conference on Local Computer Networks 2011
DOI: 10.1109/lcn.2011.6115503
|View full text |Cite
|
Sign up to set email alerts
|

Tor is unfair — And what to do about it

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(22 citation statements)
references
References 10 publications
0
21
0
1
Order By: Relevance
“…Although the concept of fairness and in particular the max-min fairness have been studied in the literature of computer networks in general (e.g., in [2,13,14,20]), one finds considerably less papers in the context of peer-to-peer networks, and in particular in BitTorrent-like systems.…”
Section: Related Workmentioning
confidence: 99%
“…Although the concept of fairness and in particular the max-min fairness have been studied in the literature of computer networks in general (e.g., in [2,13,14,20]), one finds considerably less papers in the context of peer-to-peer networks, and in particular in BitTorrent-like systems.…”
Section: Related Workmentioning
confidence: 99%
“…Of course, in practice, the distribution will not be perfectly fair; in fact, there are certain known artifacts with respect to intercircuit fairness [43]. But Tor relays include mechanisms which will still result in bandwidth allocations to circuits that are not arbitrarily unfair: there is a round-robin scheduler which picks cells from circuit queues for transmission.…”
Section: Adaptive Circuit Killingmentioning
confidence: 99%
“…An attacker needs a lower rate and thus fewer resources either if the queues of benign circuits become longer (higher value of Q) or if the distribution of relay bandwidth to the circuits becomes less fair (smaller value of α). Approaches that bound the queue lengths based on per-link feedback [10], or improve transmission scheduling in Tor [43] would therefore complement this defense strategy.…”
Section: Adaptive Circuit Killingmentioning
confidence: 99%
“…We were not only able to provide answers to a number of fundamental questions how to build anonymous communication systems with good performance, but also contributed a number of specific design improvements to Tor [11]. Likely the largest success in this area was the insight that apparently straightforward application of standard mechanisms for congestion Brought to you by | New York University Bobst Library Technical Services Authenticated Download Date | 7/10/15 6:34 PM control and flow control in such a setting, as it had been done in the Tor protocol from its very beginning, can lead to severe and unexpected security and anonymity problems: this led to the discovery of a severe problem at the heart of the Tor protocol design -and a matching, nonstraightforward remedy, which is meanwhile deployed in Tor [12].…”
Section: Internet Anonymitymentioning
confidence: 99%