skip to main content
10.1145/3316615.3316694acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicscaConference Proceedingsconference-collections
research-article

Portable TOR Router with Raspberry Pi

Authors Info & Claims
Published:19 February 2019Publication History

ABSTRACT

Nowadays, internet has become an important part of everyone's lives. The internet has turned out to be a reliable tool for communication, data transfer and many more applications for people from all over the world. An individual's internet activities are being tracked and traced without their knowledge by various means. Thus, online security is a genuine worry for web clients who intend to visit interpersonal interaction locales, make an online transaction, or take an interest in internet diversions, as they need their protection to be ensured. Internet browsing is not anonymized as many Internet Service Providers (ISP's) could legally sell users information without informing users. People's internet activities are being tracked and traced by ISPs. Moreover, network spies and snooping attempts are very hard to be defeated as an ample network snooping tools are available in the market. These issues can be curbed by using a router that has anonymous browsing infrastructure. However, most of the routers that gives anonymous browsing are not portable. From this project, people will be able to browse anonymously without being traced. Besides that, network snooping and spying attempts can be defeated. Finally, a portable The Onion Routing (TOR) router can be created with a Raspberry Pi..

References

  1. B. Shavers and J. Bair, "The Tor Browser," Hiding Behind the Keyboard, pp. 11--34, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  2. R. A. Haraty and B. Zantout, "The TOR data communication system," J. Commun. Networks, vol. 16, no. 4, pp. 415--420, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  3. G. Owen and N. Savage, "The Tor Dark Net," Glob. Comm. Internet Gov. Pap. Ser., no. 20, p. 9, 2015.Google ScholarGoogle Scholar
  4. S. Mansfield-Devine, "Tor under attack," Comput. Fraud Secur., 2014.Google ScholarGoogle Scholar
  5. H. Y. Huang and M. Bashir, "The onion router: Understanding a privacy enhancing technology community," Proc. Assoc. Inf. Sci. Technol., vol. 53, no. 1, pp. 1--10, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Chen, K. Wu, W. Chen, and Q. Zhang, "The research and implementation of the VPN gateway based on SSL," in Proceedings - 2013 International Conference on Computational and Information Sciences, ICCIS 2013, 2013, pp. 1376--1379. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Jahan, M. S. Rahman, and S. Saha, "Application specific tunneling protocol selection for Virtual Private Networks," in Proceedings of 2017 International Conference on Networking, Systems and Security, NSysS 2017, 2017.Google ScholarGoogle Scholar
  8. N. A. Hassan and R. Hijazi, "Data Hiding Using Encryption Techniques," in Data Hiding Techniques in Windows OS, 2017.Google ScholarGoogle Scholar
  9. S. Rahman, A. Haque, M. Ismail, and S. Ahmad, "Exploring influencing factors for the selection of mobile phone service providers: A structural equational modeling (SEM) approach on Malaysian consumers," African J. Bus. Manag., 2010.Google ScholarGoogle Scholar
  10. Asif Iqbal. H & Rajeswary Nadarajan, "Authentication of Email Using Email Header," J. Manag. Sci. Univ., vol. Volume 11, p. 9, 2013.Google ScholarGoogle Scholar
  11. P. K. K. K. Paul, "Information science & technology {ist} towards integration of management and technologies with people and community," J. Manag. Sci. Univ., vol. 10, p. 8, 2012.Google ScholarGoogle Scholar
  12. H. A. Safaa N. Saud, M. A. Mohamed Nazar, R. Junaidi Daud, "Arduino Based Quadcopter with Monitoring Camera," J. Manag. Sci. Univ., vol. Vol. 16, p. 13, 2018.Google ScholarGoogle Scholar
  13. A. N. AL-Masri, "Fast Transient Security Evaluation For Power System Using Artificial Intelligence e," J. Manag. Sci. Univ., vol. 2, p. 14, 2012.Google ScholarGoogle Scholar
  14. Khan, S. A., Alkawaz, M. H., & Jaharadak, A. A. (2017). An Expense Control Application for Android. Management & Science University, 15(2), 78--83.Google ScholarGoogle Scholar

Index Terms

  1. Portable TOR Router with Raspberry Pi

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICSCA '19: Proceedings of the 2019 8th International Conference on Software and Computer Applications
        February 2019
        611 pages
        ISBN:9781450365734
        DOI:10.1145/3316615

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 19 February 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader