期刊文献+

一种基于IPSec的宽带无线IP网络匿名方案与实现 被引量:1

Anonymity scheme and implementation based on IPSec for broadband wireless IP networks
下载PDF
导出
摘要 宽带无线IP(BroadbandWirelessIP,BWIP)是结合无线通信和Internet的新技术,其安全性研究已成为全球关注的焦点,目前提出的许多安全解决方案对用户匿名性考虑较少。文中结合IPSec的ESP和AH协议,利用MobileIP中FA与HA的代理功能,提出一种基于IPSec的BWIP网络匿名方案,该方案可以提供双向、实时的宽带无线Internet匿名通信,可以有效地阻止宽带无线Internet中流量分析攻击。文中先给出匿名方案的实现原理和匿名通道建立协议,然后给出实现本匿名方案的数据封装格式。分析表明,该匿名方案在支持IPSec的IP路由器和IP网关上容易实现,可以作为BWIP网络匿名基础设施。 Broadband wireless IP(BWIP) is a new technique connecting wireless communications and Internet. Its security researches have become a global problem. Unfortunately, many security schemes do not consider the user's anonymity. An anonymity scheme based on the IPSec protocol was given, which combined the agent functions of HA and FA in mobile IP and the ESP and AH in IPSec. This scheme provided bi-directional, real-time anonymous broadband wireless Internet communication that resisted traffic analysis for any broadband wireless IP applications. The principle and the created protocol of this scheme were first presented. Then the IP datagram format and the implementation of this scheme were described. This scheme was easily implemented in security gateways or IP router which supported IPSec, and could be implemented as an anonymous infrastructure for BWIP networks.
出处 《计算机应用》 CSCD 北大核心 2005年第1期168-172,共5页 journal of Computer Applications
基金 国家863计划资助项目(2002AA143021) 国家自然科学基金重大计划资助项目(90204012)
关键词 宽带无线IP IPSEC协议 匿名通信 洋葱路由技术 Broadband wireless IP IP security protocol anonymous communication onion routing
  • 相关文献

参考文献15

  • 1赵福祥,王育民,王常杰.可靠洋葱路由方案的设计与实现[J].计算机学报,2001,24(5):463-467. 被引量:19
  • 2吴振强,杨波.追踪洋葱包的高级标记方案与实现[J].通信学报,2002,23(5):96-102. 被引量:14
  • 3吴振强,杨波.基于葱头路由技术和MPLS的隐匿通信模型[J].西安电子科技大学学报,2002,29(4):513-517. 被引量:11
  • 4吴振强,杨波.洋葱路由包的封装技术研究[J].计算机工程与应用,2002,38(20):150-153. 被引量:9
  • 5REED MG , SYVERSON PF . Anonymous Connections and Onion Routing[ J]. IEEE Journal on Selected Areas in Communication-Special Issue on Copyright and Privacy Protection, 1998, 16(4):482 - 494.
  • 6GOLDSCHLAG DM, REED MG, SYVERSON PF. Onion Routing for Anonymous and Private Internet Connections[ J]. Communications of ACM, 1999,42(2), 39 -42.
  • 7CHAUM D. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms[ J]. Communications of the ACM, 1981, 24(2), 84-88.
  • 8RENNHARD M, RAFAELI S, MATHY L, et al. An Architecture for an Anonymity Network[A]. Proc of 10th IEEE Intl Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises[C]. Boston, USA, 2001.
  • 9SONG RG, KORBA L. Anonymous Intemet Communication based on IPSee[ A]. Proceedings of the International Federation for Information Processing ( IFIP), World Computer Congress Montreal[ C].Quebec, Canada, 2002.
  • 10BROWN K, SINGH S. M-TCP: TCP for mobile cellular networks[J]. ACM Computer Communication Review, 1997, 27(5): 19 -43.

二级参考文献18

  • 1[1]The anonymizer[EB/OL].http://www.anonymizer.com.
  • 2[2]MICHAEL K,AVIEL A,RUBIN D.Crowd:Anonymity for Web transcations[EB/OL].http://www.research.att.com/ projects/ crowds/papers/j8.pdf.
  • 3[3]REED M G,SYVERSON P F.Anonymous connections and onion routing[J].IEEE Journal on Selected Areas in Communication- Special Issue on Copyright and Privacy Protection,1998,16(4):482-494.
  • 4[4]GOLDSCHLAG D M,REED M G,SYVERSON P F.Hiding routing information[A].Information Hiding,Proceedings[c].Springer Verlag,LNCS,1996.1174:137-150.
  • 5[5]HOWARD J D.An analysis of security incidents on the internet [D].Camegie Mellon University,1988.
  • 6[6]SAVAGE S,WETHERALL D,KARLIN A.Practical network support for IP traceback[A].Proceedings of the 2000 ACM SIGCOMM Conference[C].August 2000.
  • 7[7]SONG D X,PERRIG A.Advanced and authenticated marking schemes for IP traceback[R].California: Computer Science Division (EECS),University of California,2000.
  • 8[8]Computer Emergency Response Team.Cert advisory CA-96.26 denial-of-service attack via pings[EB/OL].http://www.cert.org/ advisories/CA-96.26.ping.html,1996-11.
  • 9[9]Computer Emergency Response Team.Cert advisory ca-2000-01 denial-of-service developments[EB/OL].http://www.cert.org/ advisories/CA-2000-01.html,2000.
  • 10[10]MOORE D,VOELKER G M,SAVAGE S.Interring internet denial-of-service activity[A].Proceedings of the 10th USENIX Security Symposium[C].August 2001.

共引文献37

同被引文献22

  • 1徐红云,陈建二,陈松乔.基于DC-Nets的分级匿名通信系统模型[J].小型微型计算机系统,2006,27(3):461-465. 被引量:1
  • 2吴振强,马建峰.基于联合熵的多属性匿名度量模型[J].计算机研究与发展,2006,43(7):1240-1245. 被引量:9
  • 3吴振强,马建峰.一种无线Ad Hoc网络动态混淆匿名算法[J].计算机研究与发展,2007,44(4):560-566. 被引量:8
  • 4张春瑞,徐恪,王开云,姜建国.基于信任向量的P2P网络信任管理模型[J].清华大学学报(自然科学版),2007,47(7):1224-1228. 被引量:12
  • 5陆天波,方滨兴.Internet上匿名技术研究[C]..全国网络与信息安全技术研讨会.,2005..
  • 6Sherwood R,Bhattacharjee B,Srinivasan A.P5:A protocol for scalable anonymous communication[C]//Proceedings of the 2002 IEEE Symposium on Security and Privacy.[S.l.]:IEEE Computer Society Press, 2002: 58-70.
  • 7Reiter M K,Rubin A D.Crowds:anonymity for Web transaction[J]. ACM TISSEC, 1998,1 ( 1 ) : 66-92.
  • 8Reiter M K,Rubin A D.Anonymous Web transaction with crowds[J]. Communications of the ACM,1992,42(2).
  • 9Clarke I,Sandberg O,Wiley B,et al.Freenet:A distributed anonymous information storage and retrieval system[C]//Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, July 2000: 46-66.
  • 10Reed M,Syverson P,Goldschlag D.Anonymous connections and onion routing[J].IEEE Journal on Selected Areas in Communications, 1998,16(4) : 482-494.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部