

In the path selection track, performance and anonymity have been the most commonly used factors. Relays, protocol messages and traffic interception have been the most frequently exploited factors in the Tor’s deanonymization track. In the path selection track, most research works focused on the development of new algorithms. In the deanonymization track, a major chunk of research is devoted to breaching attacks followed by traffic analysis. Our study shows that majority of the research works have been made in the field of “deanonymization” track, followed by “performance analysis and architectural improvements”. Table 1: Comparison of other surveys with this survey.Īnalysis of keywords used in various studies shows that anonymity, security and privacy have been used the most. ScopeĪlSabah and Goldberg alsabah2016performanceĪlSabah and Goldberg alsabah2015performance Their research paper presents only twenty references related to anonymity while we present more than 120 1 1 1This paper has 146 references, some of the references are to tools rather than research works in all, we are considering a research corpus of 120 references. However, our paper pays more focus to the anonymity and breaching aspects of Tor than their paper. AlSabah and Goldberg alsabah2016performance presented the most comprehensive study covering complete Tor network and our paper is complementary to their survey paper.

Categorization of first column is made by listing all Tor areas considered in our study. Table 1 presents a comparison of this survey with previous surveys covering the scope of researches and implementation (experiments), verification (simulations) and analysis of various research works.

To the authors’ best knowledge, this is the most comprehensive attempt at analyzing Tor network research with a focus over its anonymity mechanism. We quantify the studies into three broad but distinct groups, including (1) deanonymization, (2) path selection, (3) analysis and performance improvements, and several sub-categories. In this paper, we survey various studies conducted on the Tor network covering the scope of these studies.
