Cracking the Anonymous IoT Routing Networks: A Deep Learning Approach

被引:2
|
作者
Bansal G. [1 ]
Chamola V. [2 ]
Hussain A. [3 ]
Khan M.K. [4 ]
机构
[1] National University of Singapore, Singapore
[2] BITS-Pilani, India
[3] Edinburgh Napier University, United Kingdom
[4] King Saud University, Saudi Arabia
来源
IEEE Internet of Things Magazine | 2023年 / 6卷 / 01期
关键词
15;
D O I
10.1109/IOTM.001.2200194
中图分类号
学科分类号
摘要
In recent years, IoT technology has been one of the most rapidly expanding fields, connecting over 27 billion connected devices worldwide. Increasing security concerns, such as software flaws and cyberattacks, limit the use of IoT devices. Tor, also known as 'The Onion Router,' is one of the most popular, secure, and widely deployed anonymous routing systems in IoT networks. Tor is based on a worldwide network of relays operated by volunteers worldwide. Tor continues to be one of the most popular and secure tools against network surveillance, traffic analysis, and information censorship due to its robust use of encryption, authentication, and routing protocols. However, ToR is not anticipated to be entirely safe. The increasing computational capabilities of adversaries threaten Tor's ability to withstand adversarial attacks and maintain anonymity. This article describes the foundation of the Tor network, how it operates, potential attacks against Tor, and the network's defense strategies. In addition, the authors present a framework for deep learning that uses bandwidth performance to identify the server's location in Tor, thereby compromising anonymity. This article examines Tor's network's current and projected future in the Internet of Things. © 2018 IEEE.
引用
收藏
页码:120 / 126
页数:6
相关论文
共 50 条
  • [1] A novel federated learning approach for routing optimisation in opportunistic IoT networks
    Bhardwaj, Moulik
    Singh, Jagdeep
    Gupta, Nitin
    Jadon, Kuldeep Singh
    Dhurandher, Sanjay Kumar
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2024, 46 (01) : 24 - 38
  • [2] A Hybrid Deep Learning Approach for Intrusion Detection in IoT Networks
    Emec, Murat
    Ozcanhan, Mehmet Hilal
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2022, 22 (01) : 3 - 12
  • [3] Entanglement Routing For Quantum Networks: A Deep Reinforcement Learning Approach
    Le, Linh
    Nguyen, Tu N.
    Lee, Ahyoung
    Dumba, Braulio
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 395 - 400
  • [4] Congestion-Aware Routing in Dynamic IoT Networks: A Reinforcement Learning Approach
    Farag, Hossam
    Stefanovic, Cedomir
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [5] Graph convolutional networks and deep reinforcement learning for intelligent edge routing in IoT environment
    Wang, Zhi
    Yi, Bo
    Kumari, Saru
    Chen, Chien Ming
    Alenazi, Mohammed J. F.
    COMPUTER COMMUNICATIONS, 2025, 232
  • [6] Adaptive NGMA Scheme for IoT Networks: A Deep Reinforcement Learning Approach
    Zou, Yixuan
    Yi, Wenqiang
    Xu, Xiaodong
    Liu, Yue
    Chai, Kok Keong
    Liu, Yuanwei
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 991 - 996
  • [7] Deep Q learning based secure routing approach for OppIoT networks
    Kandhoul, Nisha
    Dhurandher, Sanjay K.
    INTERNET OF THINGS, 2022, 20
  • [8] A new approach to anonymous multicast routing in ad hoc networks
    Bao, Lichun
    2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 988 - 992
  • [9] Bionic Conventional Deep Learning Model-Based Optimal Routing in Opportunistic IOT Networks
    Gopinathan, S.
    Babu, S.
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2025,
  • [10] A Deep Learning Approach to IoT Authentication
    Das, Rajshekhar
    Gadre, Akshay
    Zhang, Shanghang
    Kumar, Swarun
    Moura, Jose M. F.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,