Access the full text.
Sign up today, get DeepDyve free for 14 days.
Philipp Winter, Roya Ensafi, Karsten Loesing, N. Feamster (2016)
Identifying and Characterizing Sybils in the Tor Network
M. Rizal (2014)
A Study of VoIP Performance in Anonymous Network - The Onion Routing (TOR)
J. Beerends, A. Hekstra, A. Rix, M. Hollier (2002)
Perceptual evaluation of speech quality (PESQ): The new ITU standard for end-to-end speech quality a
(2013)
Tor Project
A. Panchenko, L. Pimenidis, J. Renner (2008)
Performance Analysis of Anonymous Communication Channels Provided by Tor2008 Third International Conference on Availability, Reliability and Security
(2005)
862.3: Application guide for objective quality measurement based on recommendations
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler (2002)
SIP: Session Initiation ProtocolRFC, 3261
(1996)
830: Subjective performance assessment of digital telephone-band and wideband digital codecs
Barbara Raś (2021)
HerdThe Massachusetts Review, 62
(2013)
NSA uses powerful toolbox in effort to spy on global networks
(2006)
SignalWire
Stevens Blond, D. Choffnes, William Caldwell, P. Druschel, Nicholas Merritt (2015)
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP SystemsProceedings of the 2015 ACM Conference on Special Interest Group on Data Communication
Irma Ilias, M. Ibrahim (2014)
Performance analysis of audio video codecs over Wi-Fi/WiMAX networkProceedings of the 8th International Conference on Ubiquitous Information Management and Communication
A. Pfitzmann, B. Pfitzmann, M. Waidner (1991)
ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead
(2004)
The second-generation onion router
H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson (1996)
RTP: A Transport Protocol for Real-Time ApplicationsRFC, 1889
David Schatz, M. Rossberg, G. Schäfer (2017)
Reducing call blocking rates for anonymous voice over IP communications2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
D. Chaum (1981)
Untraceable electronic mail, return addresses, and digital pseudonyms
- - (2020)
TelegramArchiwa, Biblioteki i Muzea Kościelne
A. Rix, J. Beerends, M. Hollier, A. Hekstra (2001)
Perceptual evaluation of speech quality (PESQ)-a new method for speech quality assessment of telephone networks and codecs2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221), 2
S. hulzrinneCasnerFrederi (2001)
A Transport Protocol for Real-time Applications
Robin Snader, N. Borisov (2011)
Improving Security and Performance in the Tor Network through Tunable Path SelectionIEEE Transactions on Dependable and Secure Computing, 8
(2003)
Comparison between subjective listening quality and p. 862 pesq score
The Tor Project. The Tor Metrics Project
PJSIP
Anders Lisdorf (2021)
MicrosoftCloud Computing Basics
Tor bridges -bridgedb
apps with high bandwidth requirement: measurements involved testing VoIP applications
Robin Snader, N. Borisov (2009)
EigenSpeed: secure peer-to-peer bandwidth evaluation
(2016)
: Practical Protection of Metadata in Telephony Networks
Mike Perry (2009)
TorFlow: Tor Network Analysis
Users guide for PRISM Skype collection
Roger Dingledine, S. Murdoch (2009)
Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it
A. Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, M. Sherr (2018)
Understanding Tor Usage with Privacy-Preserving MeasurementProceedings of the Internet Measurement Conference 2018
Simple Bandwidth Scanner
Aaron Johnson, Rob Jansen, Nicholas Hopper, Aaron Segal, P. Syverson (2017)
PeerFlow: Secure Load Balancing in TorProceedings on Privacy Enhancing Technologies, 2017
NSA collecting phone records of millions of Verizon customers daily , june 2013
(2003)
Recommendation g. 114. One-Way Transmission Time
G. Danezis, Claudia Díaz, C. Troncoso, B. Laurie (2010)
Drac: An Architecture for Anonymous Low-Volume Communications
Rob Jansen, Tavish Vaidya, M. Sherr (2019)
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor
(2011)
Pulseaudio
(2009)
Lightspeed gaming LLC
Rob Jansen, Nicholas Hopper (2011)
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation
Lingfen Sun (2004)
Speech quality prediction for voice over Internet protocol networks
Stamos Katsigiannis, James Scovell, N. Ramzan, L. Janowski, P. Corriveau, Michele Saad, G. Wallendael (2018)
Interpreting MOS scores, when can users see a difference? Understanding user experience differences for photo qualityQuality and User Experience, 3
Stephan Heuser, Bradley Reaves, P. Pendyala, Henry Carter, A. Dmitrienko, W. Enck, N. Kiyavash, A. Sadeghi, Patrick Traynor (2017)
Phonion: Practical Protection of Metadata in Telephony NetworksProceedings on Privacy Enhancing Technologies, 2017
Mark Handley, Van Jacobson, Colin Perkins (2006)
SDP: Session Description ProtocolRFC, 4566
(2000)
114. One-way
Frank Cangialosi, Dave Levin, N. Spring (2015)
Ting: Measuring and Exploiting Latencies Between All Tor NodesProceedings of the 2015 Internet Measurement Conference
(2015)
Onionperf : A utility to track Tor and onion service performance
AbstractAnonymous VoIP calls over the Internet holds great significance for privacy-conscious users, whistle-blowers and political activists alike. Prior research deems popular anonymization systems like Tor unsuitable for providing the requisite performance guarantees that real-time applications like VoIP need. Their claims are backed by studies that may no longer be valid due to constant advancements in Tor. Moreover, we believe that these studies lacked the requisite diversity and comprehensiveness. Thus, conclusions from these studies, led them to propose novel and tailored solutions. However, no such system is available for immediate use. Additionally, operating such new systems would incur significant costs for recruiting users and volunteered relays, to provide the necessary anonymity guarantees.It thus becomes an imperative that the exact performance of VoIP over Tor be quantified and analyzed, so that the potential performance bottlenecks can be amended. We thus conducted an extensive empirical study across various in-lab and real world scenarios to shed light on VoIP performance over Tor. In over half a million calls spanning 12 months, across seven countries and covering about 6650 Tor relays, we observed that Tor supports good voice quality (Perceptual Evaluation of Speech Quality (PESQ) >3 and one-way delay <400 ms) in more than 85% of cases. Further analysis indicates that in general for most Tor relays, the contentions due to cross-traffic were low enough to support VoIP calls, that are anyways transmitted at low rates (<120 Kbps). Our findings are supported by concordant measurements using iperf that show more than the adequate available bandwidth for most cases. Hence, unlike prior efforts, our research reveals that Tor is suitable for supporting anonymous VoIP calls.
Proceedings on Privacy Enhancing Technologies – de Gruyter
Published: Oct 1, 2020
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.