期刊文献+

基于重路由匿名通信系统的设计 被引量:7

New Design of Rerouting-based Anonymous Communication System
下载PDF
导出
摘要 在分析现有匿名通信系统的基础上,设计了一种新的基于重路由的匿名通信方案。针对如何实现用户与用户之间通信匿名性的问题,提出了一种结合重路由机制中的变长策略和下一跳路由选择策略的方法来建立匿名通信路径,该方法还引入了概率转发机制和加密机制。针对如何增强匿名通信系统稳定性和抗攻击能力的问题,提出采用多服务器协调的P2P工作方式来设计匿名通信系统;并且新方案引入了分片冗余机制,在维护匿名转发路径的同时,也对通信消息提供了保护。通过理论分析和仿真分析可知,该方案设计具有较好的稳定性和匿名性。 Based on the analysis of the current anonymous communication system, a new rerouting-based anonymous communication scheme was proposed in this paper. To realize the anonymous communication among different users, a new method is presented to combine the variable length strategy and the next-hop routing selecting strategy in the re- routing mechanism to establish the anonymous communication path. Besides, this new method also introduces the proba- bilistic forwarding mechanism and encryption mechanism. Moreover,we applied the P2P work mode which is based on multi-server coordinating technology to enhance the stability and resistibility of the anonymous communication system. The new scheme also introduces the fragmentation-redundancy mechanism to protect the communication messages, while maintaining the anonymous forwarding path. Theoretical analysis and experimental results show that our scheme has good stability and anonymity.
作者 王少辉 蒋季宏 肖甫 WANG Shao-hui JIANG Ji-hong XIAO Fu(College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China)
出处 《计算机科学》 CSCD 北大核心 2016年第10期154-159,共6页 Computer Science
基金 国家自然科学基金资助项目(61572260 61373017 61572261) 江苏省科技支撑计划(BE2015702) 南京邮电大学校项目(NY214064 NY213036)资助
关键词 匿名通信 重路由机制 加密机制 分片冗余 Anonymous communication, Rerouting mechanism, Encryption mechanism, Fragmentation redundancy
  • 相关文献

参考文献1

二级参考文献21

  • 1吴艳辉,王伟平,陈建二.匿名通信研究综述[J].小型微型计算机系统,2007,28(4):583-588. 被引量:15
  • 2The I2P Project. The invisible lnternet project [EB/OL]. [2013-11-10]. http://www, i2p2. de/.
  • 3The Tor Project. Anonimity online: The tor project [EB/OL]. [2013 -11 -10]. http://www, torproject, org/.
  • 4Kevin B, Damon M, Dirk G, et al. Low resource routing attacks against tot [C] //Proc of the 2007 ACM Workshop on Privacy in Electronic Society. New York: ACM, 2007: 11- 20.
  • 5Steven J M, Piotr Z. Sampled traffic analysis by Internet- exchange-level adversaries [G] //LNCS 4776 : Proc of the 7th Int Conf on Privacy Enhancing Technologies. Berlin: Springer, 2007:167-183.
  • 6Steve J J M, Oeorje D. Low-cost traffic analysis of Tor [C]// Proc of the 2005 IEEE Syrup on Security and Privacy. Los Alamitos, CA: IEEEComputer Society, 2005:183-195.
  • 7Moritz S, Taouflk E, Ernst W B. A global view of kad [C] //Proc of the 7th ACM SIGCOMM Conf on Internet Measurement. New York: ACM, 2007:117-122.
  • 8The 12P Projecl. Invisible lnternet project (i2p)[EB/OL]. [2013 -11- 10]. http://www, i2p2. de/static/pdf/i2pphilosophy, pdf.
  • 9Zantout B, Haraty R. I2P data communication system [C]// Proc of the 10th Int Conf on Networks. Sint Maarten, Netherlands: IARIA, 2011: 401-409.
  • 10Sehimmer L, et al. Peer profiling and selection in the I2P anonymous network [EB/OL]. [ 2009- 01- 10]. https:// gnunet, org/sites[defauh[files/12P-PET-CON 2009.1. pdf.

共引文献5

同被引文献36

引证文献7

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部