Wireless access point with multilayer data protection algorithm.
Abstract
The article proposes a multi-level algorithm for protecting information transmission by means of a wireless router and Raspberry Pi. The proposed algorithm is implemented on the basis of separate encryption tools operating in parallel with secure communication channels. By directing traffic to anonymous and protected servers (Tor) and by encrypting information and using a DNS proxy in parallel, the information is available only to legitimate users
References
S. Kostiuchko and V. Tchaban, "Variational Method of Auxiliary Equations in Nonlinear Systems Analysis and Synthesis Problems," 2019 IEEE 20th International Conference on Computational Problems of Electrical Engineering (CPEE), Lviv-Slavske, Ukraine, 2019, pp. 1-5, doi: 10.1109/CPEE47179.2019.8949123.
S. Kostiuchko, O. Kuzmych, A. Aitouche, S. Grinyuk and O. Mekush, "Application of Parametric Sensitivity Method to Analysis of Automatic Mooring Winch with Electric Drive System," 2019 4th Conference on Control and Fault Tolerant Systems (SysTol), Casablanca, Morocco, 2019, pp. 294-299, doi: 10.1109/SYSTOL.2019.8864751.
“PlanetLab – an open platform for developing, deploying, and accessing planetary-scale services.” URL: https://www.planet-lab.org
K. Ali and M. Scarr, “Robust methodologies for modeling web click distributions,” in WWW. ACM, 2007. URL: https://nymity.ch/tor-dns/ pdf/Ali2007a.pdf
J. Alstott, E. Bullmore, and D. Plenz, “powerlaw: A Python package for analysis of heavy-tailed distributions,” PLoS ONE, vol. 9, no. 1, 2014. URL: https://nymity.ch/tor-dns/pdf/Alstott2014a.pdf
Amazon Web Services, “Alexa top sites.” URL: https://aws.amazon. com/alexa-top-sites/
H. Asghari, “pyasn – Python IP address to autonomous system number lookup module.” URL: https://github.com/hadiasghari/pyasn
S. Banerjee, T. G. Griffin, and M. Pias, “The interdomain connectivity of PlanetLab nodes,” in PAM. Springer, 2004. URL: https://nymity.ch/tor-dns/pdf/Banerjee2004a.pdf
S. Bortzmeyer, “RFC 7816 – DNS query name minimisation to improve privacy,” Mar. 2016. URL: https://tools.ietf.org/html/rfc7816
X. Cai, R. Nithyanand, and R. Johnson, “CS-BuFLO: A congestion sensitive website fingerprinting defense,” in WPES. ACM, 2014. URL: https://nymity.ch/tor-dns/pdf/Cai2014a.pdf
X. Cai, X. C. Zhang, B. Joshi, and R. Johnson, “Touching from a distance: Website fingerprinting attacks and defenses,” in CCS. ACM, 2012. URL: https://nymity.ch/tor-dns/pdf/Cai2012a.pdf
A. Clauset, C. R. Shalizi, and M. E. J. Newman, “Power-law distributions in empirical data,” SIAM Review, vol. 51, no. 4, 2009. URL: https://arxiv.org/pdf/0706.1062
G. Danezis, R. Dingledine, and N. Mathewson, “Mixminion: Design of a type III anonymous remailer protocol,” in Security & Privacy. IEEE, 2003. URL: https://nymity.ch/tor-dns/pdf/Danezis2003a.pdf
R. Dingledine and N. Mathewson, “Tor protocol specification.” URL: https://spec.torproject.org/tor-spec
R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The secondgeneration onion router,” in USENIX Security. USENIX, 2004. URL: https://nymity.ch/tor-dns/pdf/Dingledine2004a.pdf
https://learn.pi-supply.com/make/how-to-setup-a-wireless-access-point-on-the-raspberry-pi/
Abstract views: 0 PDF Downloads: 0