期刊文献+

一种基于多路径网络编码的匿名通信机制 被引量:11

Anonymous Communication Mechanism with Multi-Paths Network Coding
下载PDF
导出
摘要 提出了基于多路径网络编码的信息分割传输策略ITNC(information slicing and transmitting with multi-path network coding),并基于ITNC提出了一种无需密钥基础设施的匿名通信机制AC-ITNC(anonymous communication mechanism based on ITNC).该机制将建路信息分割后编码传送,每个编码节点都对转发信息进行再次随机编码,编码系数与编码信息沿不同编码路径分离传输,从而可以在不需要密钥机制的情况下进行匿名建路.理论分析与仿真结果表明,AC-ITNC与单纯依靠源节点信息分割而中间节点不编码的匿名建路机制相比,显著提高了匿名系统的抗合谋攻击能力. This paper first proposes a new information slicing and transmitting method ITNC (information slicing and transmitting with multi-path network coding) with multi-paths network coding. Next, a novel anonymous communication mechanism AC-ITNC (anonymous communication mechanism based on ITNC) without key infrastructure, which is based on ITNC, is presented. In the new mechanism, the anonymous path setup information is sliced into pieces, and every piece is coded by the random coding coefficient. The coding coefficient and coded information pieces are delivered along different paths, which make the anonymous paths be set up in the case of non-cryptographic scheme. Theoretical analysis and simulation results show that AC-ITNC can significantly improve resistance against conspiracy attacks in an anonymous communication system within complete distributed environment without key infrastructure.
出处 《软件学报》 EI CSCD 北大核心 2010年第9期2338-2351,共14页 Journal of Software
基金 国家自然科学基金Nos.60873265 60673164 湖南省自然科学基金No.06JJ10009 高等学校博士学科点专项科研基金No.20060533057 新世纪优秀人才支持计划No.NCET-05-0683~~
关键词 匿名通信 网络编码 多路径 合谋攻击 网络安全 anonymous communication network coding multi-paths conspiracy attack network security
  • 相关文献

参考文献2

二级参考文献10

  • 1[1]D Chaum. Untraceable eletronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 1981, 24(2): 84~88
  • 2[2]Justin Boyan. The anonymizer. http://www.december.com/cmc/mag/1997/sep/boyan.html
  • 3[3]G Eran et al. Lucent personal web assistant. http://www.bell-labs.com /projects/lpwa
  • 4[4]D Goldschlag, M Reed, P Syverson. Onion routing for anonymous and private Internet connections. Communications of the ACM, 1999, 42(2): 39~41
  • 5[5]M Reed, P Syverson, D Goldschlag. Anonymous connection and onion routing. IEEE Journal on Selected Areas in Communications, 1998, 16(4): 482~492
  • 6[6]Zero-Knowledge Systems Inc. The Freedom Network. http://www.freedom.net
  • 7[7]O Berthold, H Federrath, S Kpsell. Web MIXes: A system for anonymous and unobservable Internet access. The Workshop on Design Issues in Anonymity and Unobservability, ICSI, Berkeley, 2000
  • 8[8]O Berthold, H Federrath, M Khntopp. Anonymity and unobservability in the Internet. The Workshop on Freedom and Privacy by Design/Conf on Computers, Freedom and Privacy, Toronto, Canada, 2000
  • 9[9]M K Reiter, A D Rubin. Crowds: Anonymity for web transactions. ACM Trans on Information and System Security, 1998, 1(1): 62~92
  • 10王伟平,陈建二,王建新,眭鸿飞.基于组群的有限路长匿名通信协议[J].计算机研究与发展,2003,40(4):609-614. 被引量:20

共引文献27

同被引文献114

  • 1洪锋,褚红伟,金宗科,单体江,郭忠文.无线传感器网络应用系统最新进展综述[J].计算机研究与发展,2010,47(S2):81-87. 被引量:76
  • 2罗明星,杨义先,王励成,钮心忻.抗窃听的安全网络编码[J].中国科学:信息科学,2010,40(2):371-380. 被引量:10
  • 3丁飞,张西良,胡永光,张世庆,朱琪美.无线传感器网络在环境监测系统中的应用[J].微计算机信息,2006(09S):175-177. 被引量:21
  • 4Zhang X,Wicker S B. Robustness vs efficiency in sensor networks[A].2005.
  • 5Goldschlag D,Reed M,Syverson P. Onion routing for anonymous and private Intemet cormections[J].Communications of the ACM,1999,(02):39-41.doi:10.1145/293411.293443.
  • 6Katti S,Katabi D,Puchala K. Slicing the onion:Anonymous routing without PKI,MIT-CSAIL-TR-2005-053[R].Cambridge:Massachusetts Institute of Technology,2005.
  • 7Katti S,Cohen J,Katabi D. Information slicing:Anonymity using unreliable overlays[A].New York:IEEE Press,2007.43-56.
  • 8Alshwede R,Cai N,Li S-Y R. Network information flow[J].IEEE Transactions on Information theory,2000,(04):1204-1216.doi:10.1109/18.850663.
  • 9Claessens J,Diaz C,Goemans C,et al.Revocable anonymous access to the Internet[J].Internet Research,2003,13(4):242-258.
  • 10Shuo-Yen R,Raymond W,Cai Ning.Linear network coding[J].IEEE Transactions on Information Theory,2003,49(2):371-381.

引证文献11

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部