期刊文献+

匿名通信系统中时间攻击模型研究 被引量:1

Study of Timing Attack in Anonymous Communication System
下载PDF
导出
摘要 时间攻击是指对手研究信息穿过系统的时间来找出信息发送者和接收者之间的相关性,对支持交互式的低延时匿名通信系统形成一种巨大威胁。论文提出了一种基于重路由技术的匿名通信系统和针对该系统的时间攻击模型,理论分析和计算数据表明这种时间攻击方式可以有效地破坏匿名通信系统中信息发送者和接收者之间的连接性,但这种时间攻击的成功率受到信息到达率和节点延迟时间以及重路由路长等因素的影响。 Timing attack is that an attacker studies the timing of messages moving through the system to find correlations of messages sender and receiver,It is a significant challenge for anonymous communication system that provides interactive,low-latency applications.This paper,proposes a general anonymous communication model based on rerouting,and a timing attack model also has been presented according to this model.Through analysis and simulations,this paper also shows that the kind of attacking method can efficiently destroy the anonymity links of the message sender/receiver in anonymous communication system,it also shows the effect of this timing attack is influenced by the rate of message arrivals ,the delay times and the lengths of rerouting route etc。
出处 《计算机工程与应用》 CSCD 北大核心 2005年第23期25-26,101,共3页 Computer Engineering and Applications
基金 国家自然科学基金重大项目(编号:90104028)资助 国家自然科学基金(编号:60403032)资助
关键词 匿名通信 重路由 时间攻击 MIX anonymous communication,rerouting router,timing attack,Mix
  • 相关文献

参考文献7

  • 1Levine B N,Reiter M K,Wang et al.Timing analysis in low-latency mix-based systems[C].In:A Juels ed.Financial Cryptography,Springer- Verlag, LNCS(forth-coming),2004.
  • 2Goldschlag D,Reed M,Syverson P.Onion routing for anonymous and private internet connections[J].Communctions of the ACM, 1999;42(2): 39-41.
  • 3Back A,Goldberg I,Shostack A.Freedom systems 2.1 security issues and analysis.White paper,Zero Knowl-edge Systems,Inc,2001-05.
  • 4Chaum D.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM, 1981 ;4(2):84-88.
  • 5Pfitzmann A,Kohntopp M.Anonymity,Unobservability,and Pseudonymity: A Proposal for Terminology[C].In: H Federrath ed.Designing Privacy Enhancing technologies:Design Issues in Anonymity and Observability, Springer-Verlag, LNCS 2009,2000 : 1 -9.
  • 6Reiter M K,Rubin A D.Crowds:Anonymity for Web Transactions[J]. ACM Transactions on Information and system security, 1998; 1 ( 1 ): 66-92.
  • 7Kesdogan D,Egner J,Buschkes 1LStop-and--Go Mixes:Providing Probabilistic Anonymity in an Open System[C].In:Proceedings of Information Hiding Workshop(IH'98), 1998 : 83-98.

同被引文献8

  • 1眭鸿飞,陈建二,陈松乔,朱娜斐.重路由匿名通信系统中基于秘密共享的重路由算法[J].计算机研究与发展,2005,42(10):1660-1666. 被引量:7
  • 2朱娜斐,陈松乔,眭鸿飞,陈建二.匿名通信概览[J].计算机应用,2005,25(11):2475-2479. 被引量:4
  • 3高智世.一种改进的混合匿名通信系统[J].微计算机信息,2005,21(11X):27-29. 被引量:2
  • 4Y. Guan, X. Fu, R. Bettati, W. Zhao. An optimal strategy for anonymous communication protocols[J]. In: Proc. 22nd Int'l Conf. Distributed Computing Systems. Los Alamitos, CA: IEEE Computer Science Press, 2002. 257-266.
  • 5M. K. Reiter, A. D. Rubin. Crowds: Anonymity for Web Trans- actions [J], ACM Transactions on Information and System Security, 1998,1(1):62-92.
  • 6Oliver Berthold, Andreas Pfitzmann, Ronny Standtke. The dis- advantages of free MIX routes and routes and how to overcome them[J]. In: Designing Privacy Enhancing Technologies: Proc of the International workshop on the Design Issues in anonymity and Ob- servability, 2000,7,27-42.
  • 7Kesdogan D, Egner J, Buschkes R. Stop-and-Go Mixes: Pro- viding Probabilistic Anonymity in an Open System[C]. In: Proceed- ings of Information Hiding Workshop(IH 98), 1998: 83-98.
  • 8陆庆,周世杰,傅彦.匿名通信技术分析[J].电子科技大学学报,2004,33(2):162-165. 被引量:4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部