Cracking the Anonymous IoT Routing Networks: A Deep Learning Approach

被引:2
|
作者
Bansal G. [1 ]
Chamola V. [2 ]
Hussain A. [3 ]
Khan M.K. [4 ]
机构
[1] National University of Singapore, Singapore
[2] BITS-Pilani, India
[3] Edinburgh Napier University, United Kingdom
[4] King Saud University, Saudi Arabia
来源
IEEE Internet of Things Magazine | 2023年 / 6卷 / 01期
关键词
15;
D O I
10.1109/IOTM.001.2200194
中图分类号
学科分类号
摘要
In recent years, IoT technology has been one of the most rapidly expanding fields, connecting over 27 billion connected devices worldwide. Increasing security concerns, such as software flaws and cyberattacks, limit the use of IoT devices. Tor, also known as 'The Onion Router,' is one of the most popular, secure, and widely deployed anonymous routing systems in IoT networks. Tor is based on a worldwide network of relays operated by volunteers worldwide. Tor continues to be one of the most popular and secure tools against network surveillance, traffic analysis, and information censorship due to its robust use of encryption, authentication, and routing protocols. However, ToR is not anticipated to be entirely safe. The increasing computational capabilities of adversaries threaten Tor's ability to withstand adversarial attacks and maintain anonymity. This article describes the foundation of the Tor network, how it operates, potential attacks against Tor, and the network's defense strategies. In addition, the authors present a framework for deep learning that uses bandwidth performance to identify the server's location in Tor, thereby compromising anonymity. This article examines Tor's network's current and projected future in the Internet of Things. © 2018 IEEE.
引用
收藏
页码:120 / 126
页数:6
相关论文
共 50 条
  • [41] Reinforcement learning based reliability-aware routing in IoT networks
    Ergun, Kazim
    Ayoub, Raid
    Mercati, Pietro
    Rosing, Tajana
    AD HOC NETWORKS, 2022, 132
  • [42] Machine Learning-Based Satellite Routing for SAGIN IoT Networks
    Yuan, Xueguang
    Liu, Jinlin
    Du, Hang
    Zhang, Yangan
    Li, Feisheng
    Kadoch, Michel
    ELECTRONICS, 2022, 11 (06)
  • [43] A novel approach of botnet detection using hybrid deep learning for enhancing security in IoT networks
    Ali, Shamshair
    Ghazal, Rubina
    Qadeer, Nauman
    Saidani, Oumaima
    Alhayan, Fatimah
    Masood, Anum
    Saleem, Rabia
    Khan, Muhammad Attique
    Gupta, Deepak
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 103 : 88 - 97
  • [44] On Adjusting Data Throughput in IoT Networks: A Deep-Reinforcement-Learning-Based Game Approach
    Brik, Bouziane
    Esseghir, Moez
    Merghem-Boulahia, Leila
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 11368 - 11380
  • [45] Learning Based Routing Link Scheduling in Heterogeneous Wireless IoT Networks
    Wang, Zhiyang
    Guo, Jianlin
    Parsons, Kieran
    Nagai, Yukimasa
    Sumi, Takenori
    Orlik, Philip
    2024 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS 2024, 2024, : 1666 - 1672
  • [46] Deep Reinforcement Learning Approach for Joint Trajectory Design in Multi-UAV IoT Networks
    Xu, Shu
    Zhan, Xiangyu
    Li, Chunguo
    Wang, Dongming
    Yang, Luxi
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (03) : 3389 - 3394
  • [47] VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning
    Islam, Faiz Ul
    Liu, Guangjie
    Zhai, Jiangtao
    Liu, Weiwei
    IEEE ACCESS, 2021, 9 : 59783 - 59799
  • [48] Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models
    Rihan, Shaza Dawood Ahmed
    Anbar, Mohammed
    Alabsi, Basim Ahmad
    SENSORS, 2023, 23 (17)
  • [49] A Multi-Layer Classification Approach for Intrusion Detection in IoT Networks Based on Deep Learning
    Qaddoura, Raneem
    Al-Zoubi, Ala' M.
    Faris, Hossam
    Almomani, Iman
    SENSORS, 2021, 21 (09)
  • [50] A GAN-based Hybrid Deep Learning Approach for Enhancing Intrusion Detection in IoT Networks
    Balaji, S.
    Dhanabalan, G.
    Umarani, C.
    Naskath, J.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 348 - 354