A survey on Darknet and various Techniques of Onion Routing

Hansraj Mathakar, Mitesh Dedakia, Akshay Orpe


The World Wide Web is quite a large web space. Today, we assume that modern world is connected and we can obtain information in a flash. That is true to some extent, all thanks to the modern search engines (Google, Bing etc). These search engine’s algorithms process huge amount of information in a fraction of seconds. In the real word, this visible web has huge amount of information which is not indexed. Hence this information cannot be identified by the traditional web crawlers. This huge amount of unindexed information which is not spidered is dark net. Dark web is a subset of deep web. Dark web arises from the TOR network (Darknet), which is highly encrypted and thus resistant to traffic analysis and any kind of surveillance. Behind darknet, there are various types of Onion routing techniques which makes the presence of darknet feasible. In this paper, we discuss the various aspects and components involving in darknet. We also discuss various techniques of onion routing. 


WWW, Deep Web, Dark net, Onion Routing, TOR networks

Full Text:



Roger E. Bohn and James E. Short. “2009 report on American consumers - Technical report”, University of California, San Diego, 2009.

Idc worldwide predictions 2014: Battles for dominance and survival on the 3rd platform. http://www.idc.com/ research/Predictions14/index.jsp, 2014

Michael K. Bergman, “White paper: The deep web: Surfacing hidden value. Journal of electronic publishing”, Volume 7 Issue-1, 2001

Rashmi K. B, Vijaya Kumar T, H. S. Guruprasad,, “Deep Web Crawler: Exploring and Re-ranking of Web Forms”,International Journal of Computer Applications, Volume 150 – No.1, September 2016 ISSN : 0975 – 8887

Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman, “The Darknet and the Future of Content Distribution”, Microsoft Corporation.

Forward-Looking Threat Research (FTR) Team, “Cybercrime and the Deep Web”, Trend Micro.

Tianbo Lu, Zhimin Lin, Lingling Zhao, Yang Li , “On Privacy and Anonymity in Freenet System”, International Journal of Security and Its Applications, Vol. 10, No. 5 (2016) pp.41-56.

Michael Rogers, Saleem Bhatti, “DARKNET: Decentralised Adaptive Routing without Knowledge of the Network Endpoints or Topology”, Department of Computer Science University College London Gower Street London WC1E 6BT, UK, April 2007.

Henrik Erkkonen ,Jonas Larsson, Datateknik, Chalmers, “Anonymous Networks: Onion Routing with TOR, Garlic Routing with I2P”, EDA390, Computer communication and distributed systems, 2005.

Aniket Kate, Greg Zaverucha, and Ian Goldberg, “Pairing-Based Onion Routing”, pp 1-23

Dario Catalano, Dario Fiore, Rosario Gennaro, “Certificateless Onion Routing”, CCS’09, November 9–13, 2009, Chicago, Illinois, USA.

A. Kate, G. Zaverucha and I. Goldberg. Pairing-Based Onion Routing with Improved Forward Secrecy. In ACM Transactions on Information and System

Security, 2009.

Peng Zhou, Xiapu Luo, Ang Chen, Rocky K.C.Chang , “SGor: Trust graph based onion routing”, Computer Networks, ELSEVIER, 2014, pp. 3522–3544

Michael G. Reed, Paul F. Syverson, and David M. Goldschlag , “Anonymous Connections and Onion Routing”, Naval Research Laboratory.

Chen Chen, Daniele E. Asoni, David Barrera, George Danezis, Adrian Perrig, “HORNET: High-speed Onion Routing at the Network Layer”, ACM, pp 1-14

Alex Biryukov , Ivan Pustogarov , Fabrice Thill, “Content and popularity analysis of Tor hidden services” IEEE, June-3 July 2014, ISSN: 1545-0678

Karsten Loesing, Werner Sandmann, Christian Wilms, Guido Wirtz, “ Performance Measurements and Statistics of Tor Hidden Services”, IEEE, 2008.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2319-5606

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © Blue Ocean Publication (www.borjournals.com). All Rights Reserved.