TorKameleon: Improving Tor's Censorship Resistance with K-anonymization and Media-based Covert Channels

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Anonymity networks like Tor significantly enhance online privacy but are vulnerable to correlation attacks by state-level adversaries. While covert channels encapsulated in media protocols, particularly WebRTC-based encapsulation, have demonstrated effectiveness against passive traffic correlation attacks, their resilience against active correlation attacks remains unexplored, and their compatibility with Tor has been limited. This paper introduces TorKameleon, a censorship evasion solution designed to protect Tor users from both passive and active correlation attacks. TorKameleon employs K-anonymization techniques to fragment and reroute traffic through multiple TorKameleon proxies, while also utilizing covert WebRTC-based channels or TLS tunnels to encapsulate user traffic.
Original languageEnglish
Title of host publication2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
EditorsJia Hu, Geyong Min, Guojun Wang
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages1490-1495
Number of pages6
ISBN (Electronic)979-8-3503-8199-3
ISBN (Print)979-8-3503-8200-6
DOIs
Publication statusPublished - 2023
Event22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2023 - Exeter, United Kingdom
Duration: 1 Nov 20233 Nov 2023

Publication series

NameIEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
ISSN (Print)2324-898X
ISSN (Electronic)2324-9013

Conference

Conference22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2023
Country/TerritoryUnited Kingdom
CityExeter
Period1/11/233/11/23

Keywords

  • Censorship Circumvention
  • K-anonymization
  • Tor
  • Traffic Correlation Attacks
  • Traffic Encapsulation
  • WebRTC

Cite this