DSpace Repository

Protecting Online Privacy by Heightening Communication Path Using Different Hops Path Tor

Show simple item record

dc.contributor.author Amna Saad
dc.contributor.author Ahmad Roshidi Amran
dc.contributor.author Awang Mohamed Fadli Awang Ismail
dc.contributor.author (UniKL MIIT)
dc.date.accessioned 2018-06-07T09:02:40Z
dc.date.available 2018-06-07T09:02:40Z
dc.date.issued 2018-06-07
dc.identifier.uri http://ir.unikl.edu.my/jspui/handle/123456789/18980
dc.description.abstract The vulnerabilities within the internet cause an unauthorized person to hack and steal our private data and spot our location within the cyber world. Some people do not think this as an issue. They would be more upset if the link is down, the connection is slow or when the link is intermittent. Hence, without their knowledge, their wellbeing is being monitored by an unknown person or group. The information gained can later be used against their personal interests. Others are very concerned about this matter. They want to protect their privacy and identity in the cyber world. We proposed a solution to curb these activities by providing extra layers of internet connectivity protection, in order to create anonymous communication on demand. In this project, we develop two, three and six hops security of the Tor wireless router on a Raspberry Pi 3. The client can choose to use, either hard¬ware-based 3-hops path standard security Tor or software-based security Tor custom for 2-hops and 6-hops paths via application software rebuilding using MSYS2 and MNGW tool. Our result shows that there in no significant performance different in term of the connections response time regardless of the number of the Tor path lengths. en_US
dc.language.iso en en_US
dc.subject Privacy Protection en_US
dc.subject Raspberry Pi en_US
dc.subject The onion router en_US
dc.title Protecting Online Privacy by Heightening Communication Path Using Different Hops Path Tor en_US
dc.type Other en_US
dc.conference.name International Conference on Information and Communication Technology en_US
dc.conference.year 2018 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account