Tor instead of IP

  • Authors:
  • Vincent Liu;Seungyeop Han;Arvind Krishnamurthy;Thomas Anderson

  • Affiliations:
  • University of Washington;University of Washington;University of Washington;University of Washington

  • Venue:
  • Proceedings of the 10th ACM Workshop on Hot Topics in Networks
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

As the Internet has become more popular, it has increasingly been a target and medium for monitoring, censorship, content discrimination, and denial of service. Although anonymizing overlays such as Tor [2] provide some help to end users in combating these trends, the overlays themselves have become targets in turn. In this paper, we take a fresh approach: instead of running Tor on top of IP, we propose to run Tor instead of IP. We ask: what might the Internet look like if privacy and censorship resistance had been designed in from scratch? To be practical, any proposal also needs to be robust to failures, achieve reasonable efficiency compared to today's Internet, and be consistent with ISP economic concerns. Although preliminary, we argue that our design achieves these goals.