IDEAS home Printed from https://ideas.repec.org/a/spr/telsys/v87y2024i1d10.1007_s11235-024-01149-y.html
   My bibliography  Save this article

Security, information, and structure characterization of Tor: a survey

Author

Listed:
  • Mahdieh Zabihimayvan

    (Central Connecticut State University)

  • Reza Sadeghi

    (Marist College)

  • Derek Doran

    (LLC)

Abstract

Content on the World Wide Web that is not indexable by standard search engines defines a category called the deep Web. Dark networks are a subset of the deep Web. They provide services of great interest to users who seek online anonymity during their search on the Internet. Tor is the most widely used dark network around the world. It requires unique application layer protocols and authorization schemes to access. The present evidence reveals that in spite of great efforts to investigate Tor, our understanding is limited to the work on either the information or structure of this network. Also, interplay between information and structure that plays an important role in evaluating socio-technical systems including Tor has not been given the attention it deserves. In this article, we review and classify the present work on Tor to improve our understanding of this network and shed light on the new directions to evaluate Tor. The related work can be categorized into proposals that (1) study the security and privacy on Tor, (2) characterize Tor’s structure, (3) evaluate the information hosted on Tor, and (4) review the related work on Tor from 2014 to the present.

Suggested Citation

  • Mahdieh Zabihimayvan & Reza Sadeghi & Derek Doran, 2024. "Security, information, and structure characterization of Tor: a survey," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 87(1), pages 239-255, September.
  • Handle: RePEc:spr:telsys:v:87:y:2024:i:1:d:10.1007_s11235-024-01149-y
    DOI: 10.1007/s11235-024-01149-y
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s11235-024-01149-y
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s11235-024-01149-y?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Hsinchun Chen & Wingyan Chung & Jialun Qin & Edna Reid & Marc Sageman & Gabriel Weimann, 2008. "Uncovering the dark Web: A case study of Jihad on the Web," Journal of the American Society for Information Science and Technology, Association for Information Science & Technology, vol. 59(8), pages 1347-1359, June.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Han Woo Park, 2014. "Mapping election campaigns through negative entropy: Triple and Quadruple Helix approach to South Korea’s 2012 presidential election," Scientometrics, Springer;Akadémiai Kiadó, vol. 99(1), pages 187-197, April.
    2. Oksanen, Atte & Hawdon, James & Räsänen, Pekka, 2014. "Glamorizing rampage online: School shooting fan communities on YouTube," Technology in Society, Elsevier, vol. 39(C), pages 55-67.
    3. Edoardo Magnone, 2014. "The extreme case of terrorism: a scientometric analysis," Scientometrics, Springer;Akadémiai Kiadó, vol. 101(1), pages 179-201, October.
    4. Julei Fu & Duoyong Sun & Jian Chai & Jin Xiao & Shouyang Wang, 2015. "The “six-element” analysis method for the research on the characteristics of terrorist activities," Annals of Operations Research, Springer, vol. 234(1), pages 17-35, November.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:telsys:v:87:y:2024:i:1:d:10.1007_s11235-024-01149-y. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.