期刊文献+

N路冗余重路由算法及其性能分析

N-path Redundancy Rerouting Arithmetic and Its Performance Analysis
下载PDF
导出
摘要 通过分析基于重路由的匿名通信系统模型,提出一种适合节点在环境恶劣、性能不稳定条件下工作的N路冗余重路由算法,对使用该算法的匿名通信系统的可靠性、负载特性和匿名性进行理论推导和分析,结果证明,该算法能满足用户提出的可靠性边界条件,较大地提高重路由路径的可靠性并保证系统的匿名性,但会增加节点负载,减小系统容量。 Reroutiug mechanism is the main kind of the method to achieve anonymous communication system. Based on the model of rerouting-based anonymous communication system, this paper gives a new rerouting arithmetic that can build the rerouting path with N-path redundancy and work well in hard conditions. It calculates rerouting path dependability of the system and payload performance of the nodes, and analyzes its anonymity. The result shows that the N-path redundancy rerouting arithmetic satisfies the user's requirements for dependability, and it increases the dependability of the rerouting path and ensures the sender's anonymity. But it increases the node's payload and decreases capacity of the system.
作者 陶颋 孙乐昌
出处 《计算机工程》 CAS CSCD 北大核心 2008年第24期121-123,127,共4页 Computer Engineering
关键词 匿名通信 重路由 可靠性 anonymous communication rerouting dependability
  • 相关文献

参考文献5

  • 1Reed M, Syverson P, Goldschlag D. Anonymous Connections and Onion Touting[J]. IEEE Journal on Selected Areas in Communication, 1998, 16(4): 482-494.
  • 2Reiter M K, Rubin A D. Crouds: Anonymity for Web Transactions[J]. ACM Trans. on Info. and System Security, 1998, 1(1): 66-92.
  • 3Shields C, Levine B N. A Protocol for Anonymous Communication over the Internet[C]//Proc. of the 7th ACM Conf. on Computer and Communication Security. New York, USA: ACM Press, 2000.
  • 4眭鸿飞,陈松乔,陈建二,王建新,王伟平.基于重路由匿名通信系统的负载分析[J].软件学报,2004,15(2):278-285. 被引量:19
  • 5徐红云,陈建二,陈松乔.匿名通信系统中统计型攻击模型研究[J].小型微型计算机系统,2004,25(11):1926-1929. 被引量:7

二级参考文献7

  • 1Gilbert H, Chasse G. A statistical attack of the feal-8 cryptosystem[J]. Computer Science,1991, 537:22-33.
  • 2Andre L, M dos Santos. Statistical attack against Virtual Banks[R]. Reliable Software Group,University of California, 2000.
  • 3Reiter M K, Rubin A D. Crowds:anonymity for web transactions[J]. ACM Transactions on Information and System Security, 1998,1(1):62-92.
  • 4Stefan Savage, David Wetherall, Anna Karlin , Tom Anderson. Practical network support for IP traceback[R]. Department of Computer Science and Engineering,University of Washington, Seattle. Technical Report UW-CSE-00-02-01
  • 5Micah Adler. Tradeoffs in probabilistic packet marking for IP traceback[D]. Department of Computer Science,University of Massachusetts, Amherst, November 9,2001.
  • 6Matsui M, Yamagishi A. Statistical attack on secret key cryptosystems[J]. Electronics and Communications in Japan Part Ⅲ-Fundamental Electronic Science, Sep. 1994, 77(9):61-72.
  • 7王伟平,陈建二,王建新,眭鸿飞.基于组群的有限路长匿名通信协议[J].计算机研究与发展,2003,40(4):609-614. 被引量:20

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部