期刊文献+

源路由匿名通信系统中主动路径探测机制研究

Research of Active Path Detection in Anonymous Communication System Based on Source Routing
下载PDF
导出
摘要 在源路由匿名通信系统中,通信发送者发起建立一条由多个成员组成的重路由路径,并采用嵌套加密技术加密传输数据,以保证通信关系匿名。然而,通过主动破坏重路由路径并迫使其多次重构,合谋成员能采用前驱攻击的方法,推断出通信发送者的真实身份,破坏系统的匿名性。本文提出主动路径探测机制,由通信发送者发送嵌套加密Ping 报文以探测重路由路径的状态,根据用户返回的签名响应报文确定路径上的故障点,以确定系统中的主动合谋成员,从而提高匿名通信的安全性。 To achieve the relationship anonymity,the sender of communication establishes a rerouting path consisted of multiple participants in the Anonymous Communication System based on Source Routing(ACSSR),and nested-en- crypt the message.By destroying the rerouting path,however,collaborators in system can force the rerouting path to reset multi-time,thus perform predecessor attack to determine the sender of communication,and compromise the anonymity.In this paper,a strategy based on active path detection mechanism is proposed,which ping every interme- diator of the rerouting path by nested-encryption message.Active collaborators can be located precisely according to the response message after the collaborators destroy the rerouting path muhi-times.Thus,the security and reliability of system could be enhanced effectively.
出处 《计算机科学》 CSCD 北大核心 2004年第8期26-28,共3页 Computer Science
基金 国家自然科学基金(编号:90104028) 国家杰出青年科学基金(编号:69928201)
关键词 信息隐藏 匿名通信 主动路径探测 嵌套加密技术 网络通信 重路由机制 Information hiding Anonymous communication
  • 相关文献

参考文献12

  • 1Pfitzmann A, Kohntopp M. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In: Hannes,F. ed.Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability. Berkeley, CA, USA: Spr
  • 2Chaum D. Untraceable electronic mail,return addresses,and digital pseudonyms. Communications of the ACM,1981,24(2): 84-90
  • 3Anonymous Remailer. http://www. lcs. mit. edu/research/anonymous. html
  • 4Syverson P,Goldschlag D,Reed M. Anonymous Connections and Onion Routing. In: Proc. of the IEEE Symposium on Security and Privacy. Oakland, CA, USA: IEEE Computer Society Press,1997. 44-54
  • 5Goldschlag D, Reed M,Syverson P. Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM,1999,42 (2): 39-41
  • 6Reiter M K,Rubin A D. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security,1998,1(1):66-92
  • 7Shields C,Levine B N. A Protocol for Anonymous Communication Over the Internet. In: Proc. of 7th ACM Conf. on Computer and Communication Security. New York: ACM Press,2000. 33-42
  • 8Rennhard M, Plattner B. Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In:Proc. of the Workshop on Privacy in the Electronic Society,Washington, DC, USA, Nov. 2002
  • 9Freedman M J,Morris R. Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: Proc. of the 9th ACM Conf. on Computer and Communications Security (CCS 2002), Washington, DC, USA,Nov. 2002
  • 10Wright M,et al. An Analysis of the Degradation of Anonymous Protocols. In: Proc. of the Network and Distributed Security Symposium - NDSS '02 ,Feb. 2002

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部