ABSTRACT
Nowadays, internet has become an important part of everyone's lives. The internet has turned out to be a reliable tool for communication, data transfer and many more applications for people from all over the world. An individual's internet activities are being tracked and traced without their knowledge by various means. Thus, online security is a genuine worry for web clients who intend to visit interpersonal interaction locales, make an online transaction, or take an interest in internet diversions, as they need their protection to be ensured. Internet browsing is not anonymized as many Internet Service Providers (ISP's) could legally sell users information without informing users. People's internet activities are being tracked and traced by ISPs. Moreover, network spies and snooping attempts are very hard to be defeated as an ample network snooping tools are available in the market. These issues can be curbed by using a router that has anonymous browsing infrastructure. However, most of the routers that gives anonymous browsing are not portable. From this project, people will be able to browse anonymously without being traced. Besides that, network snooping and spying attempts can be defeated. Finally, a portable The Onion Routing (TOR) router can be created with a Raspberry Pi..
- B. Shavers and J. Bair, "The Tor Browser," Hiding Behind the Keyboard, pp. 11--34, 2016.Google ScholarCross Ref
- R. A. Haraty and B. Zantout, "The TOR data communication system," J. Commun. Networks, vol. 16, no. 4, pp. 415--420, 2014.Google ScholarCross Ref
- G. Owen and N. Savage, "The Tor Dark Net," Glob. Comm. Internet Gov. Pap. Ser., no. 20, p. 9, 2015.Google Scholar
- S. Mansfield-Devine, "Tor under attack," Comput. Fraud Secur., 2014.Google Scholar
- H. Y. Huang and M. Bashir, "The onion router: Understanding a privacy enhancing technology community," Proc. Assoc. Inf. Sci. Technol., vol. 53, no. 1, pp. 1--10, 2016. Google ScholarDigital Library
- F. Chen, K. Wu, W. Chen, and Q. Zhang, "The research and implementation of the VPN gateway based on SSL," in Proceedings - 2013 International Conference on Computational and Information Sciences, ICCIS 2013, 2013, pp. 1376--1379. Google ScholarDigital Library
- S. Jahan, M. S. Rahman, and S. Saha, "Application specific tunneling protocol selection for Virtual Private Networks," in Proceedings of 2017 International Conference on Networking, Systems and Security, NSysS 2017, 2017.Google Scholar
- N. A. Hassan and R. Hijazi, "Data Hiding Using Encryption Techniques," in Data Hiding Techniques in Windows OS, 2017.Google Scholar
- S. Rahman, A. Haque, M. Ismail, and S. Ahmad, "Exploring influencing factors for the selection of mobile phone service providers: A structural equational modeling (SEM) approach on Malaysian consumers," African J. Bus. Manag., 2010.Google Scholar
- Asif Iqbal. H & Rajeswary Nadarajan, "Authentication of Email Using Email Header," J. Manag. Sci. Univ., vol. Volume 11, p. 9, 2013.Google Scholar
- P. K. K. K. Paul, "Information science & technology {ist} towards integration of management and technologies with people and community," J. Manag. Sci. Univ., vol. 10, p. 8, 2012.Google Scholar
- H. A. Safaa N. Saud, M. A. Mohamed Nazar, R. Junaidi Daud, "Arduino Based Quadcopter with Monitoring Camera," J. Manag. Sci. Univ., vol. Vol. 16, p. 13, 2018.Google Scholar
- A. N. AL-Masri, "Fast Transient Security Evaluation For Power System Using Artificial Intelligence e," J. Manag. Sci. Univ., vol. 2, p. 14, 2012.Google Scholar
- Khan, S. A., Alkawaz, M. H., & Jaharadak, A. A. (2017). An Expense Control Application for Android. Management & Science University, 15(2), 78--83.Google Scholar
Index Terms
- Portable TOR Router with Raspberry Pi
Recommendations
Short Survey: Privacy-enhancing technologies for the world wide web
Privacy is at stake on the World Wide Web (WWW). In this article, we overview, discuss, and put into perspective some privacy-enhancing technologies (PETs) that can be used to provide anonymity services on the WWW. More specifically, we look at PETs ...
Security Solution Based on Raspberry PI and IoT
Cyberspace Safety and SecurityAbstractThis project focuses on building and developing a secure smart home IoT system that can give near real-time information about the status of the home, with the aid of cloud and wireless sensor communication technologies. In this paper, the ...
Comments