期刊文献+

TRACCS:一种基于诱骗路由的匿名通信系统

TRACCS:A Decoy Routing-Based Anonymous Communication System
下载PDF
导出
摘要 在分析洋葱网络和折射网络类匿名系统的基础上,设计一种新的基于诱骗路由的匿名通信系统。针对现有折射网络类系统匿名性不强的问题,结合洋葱网络层次化加密思想和“端到中”架构的折射网络系统诱骗路由器不可见的特点,提出了基于两级诱骗路由加两层数据加解密构建的匿名通信系统TRACCS。系统利用折射网络系统中隐藏标签的设计机制结合ECDH算法协商生成数据层次化加密所需密钥,并利用该密钥对TLS记录协议承载数据进行加密封装传输。利用幽灵地址的嵌套使用破坏消息发送者与接收者的对应关系,实现发送者匿名和通联关系匿名。实验结果表明,该系统在实现更高匿名性的基础上,通信性能没有显著下降,实用性较好。 On the basis of analyzing the Tor network and the anonymous system of the refraction network,a new anonymous communication system based on decoy routing is designed.To address the problem of poor anonymity of the existing refraction network system,combining the hierarchical encryption idea of Tor network and“end-to-middle”architecture of the refraction network system with invisible decoy routers,a new anonymous communication system,TRACCS,is proposed on the grounds of two-layer decoy routing and two-layer data hierarchical encryption.The system utilizes the session key to encrypt and encapsulate the data carried by the TLS record protocol,and the key is negotiated through the ECDH algorithm combining with the hidden label design mechanism of the refraction network.The nested use of phantom addresses breaks the correspondence between the message sender and receiver,and the anonymity of the sender and the communication relationship is realized.Experimental results show that,on the basis of achieving anonymity,the communication performance of the system is not significantly decreased,and the practicability is better.
作者 李慧杰 蔡瑞杰 陆炫廷 刘胜利 LI Huijie;CAI Ruijie;LU Xuanting;LIU Shengli(Information Engineering University, Zhengzhou 450001, China)
机构地区 信息工程大学
出处 《信息工程大学学报》 2020年第6期651-657,共7页 Journal of Information Engineering University
基金 科研基金资助项目(2019-JCJQ-ZD-113)。
关键词 匿名系统 诱骗路由 折射网络 anonymous system decoy routing refraction network
  • 相关文献

参考文献3

二级参考文献23

  • 1ERIC W,SCOTT W,IAN G,et al.Telex:anticensorship in the network infrastructure[A].Proceedings of the 20th USENIX Security Symposium[C].San Francisco,USA,2011.
  • 2AMIR H,GIANG T K N,CAESAR M,NIKITA B.Cirripede:circumvention infrastructure using router redirection with plausible deniability[A].Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011)[C].Chicago,IL,USA,2011.187-200.
  • 3JOSH K,DANIEL E,ALDEN W,et al.Decoy routing:toward unblockable Internet communication[A].Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)[C].2011.
  • 4RICHARD C,STEVEN J M,ROBERT N M W.Ignoring the great firewall of China[A].Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)[C].Cambridge,UK,2006.20-35.
  • 5TARIQ E,IAN G CORDON A Taxonomy of Internet Censorship Resistance Strategies[R].CACR Tech Report 2012-33,2012.
  • 6PHILIPP W,STEFAN L.How the great firewall of China is blocking[A].Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI2012)[C].2012.
  • 7QIYAN W,XUN G,GIANG T K,et al.CensorSpoofer:asymmetric communication using IP spoofing for censorship-resistant web browsing[A].Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012)[C].2012.
  • 8MAX S,JOHN G,CHRISTOPHER T,et al.Routing around decoys[A].Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012)[C].Raleigh,USA,2012.85-96.
  • 9HOUMANSADR A,EDMUND L W,VITALY S.No direction home:the true cost of routing around decoys[A].Proceedings of the Network and Distributed Security Symposium (NDSS 2014)[C].2014.
  • 10ANDREW H.Fingerprinting websites using traffic analysis[A].Proceedings of Privacy Enhancing Technologies workshop (PET 2002)[C].2002.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部