浏览全部资源
扫码关注微信
陕西师范大学 计算机科学学院,陕西 西安 710062
[ "周彦伟(1986-),男,甘肃通渭人,陕西师范大学博士生,主要研究方向为密码学和匿名通信技术。" ]
[ "吴振强(1968-),男,陕西柞水人,博士,陕西师范大学教授、博士生导师,主要研究方向为匿名通信技术、网络安全、网络编码及应用。" ]
[ "杨波(1963-),男,陕西富平人,博士,陕西师范大学教授、博士生导师,主要研究方向为密码学和信息安全。" ]
网络出版日期:2015-06,
纸质出版日期:2015-06-25
移动端阅览
周彦伟, 吴振强, 杨波. 多样化的可控匿名通信系统[J]. 通信学报, 2015,36(6):105-115.
Yan-wei ZHOU, Zhen-qiang WU, Bo YANG. Diversity of controllable anonymous communication system[J]. Journal on communications, 2015, 36(6): 105-115.
周彦伟, 吴振强, 杨波. 多样化的可控匿名通信系统[J]. 通信学报, 2015,36(6):105-115. DOI: 10.11959/j.issn.1000-436x.2015138.
Yan-wei ZHOU, Zhen-qiang WU, Bo YANG. Diversity of controllable anonymous communication system[J]. Journal on communications, 2015, 36(6): 105-115. DOI: 10.11959/j.issn.1000-436x.2015138.
随着网络通信技术的发展,Tor 匿名通信系统在得到广泛应用的同时暴露出匿名性较弱等不安全因素,针对上述问题,基于节点的区域管理策略提出一种多样化的可控匿名通信系统(DC-ACS),DC-ACS中多样化匿名链路建立机制根据用户需求选择相应区域的节点完成匿名通信链路的建立,同时基于行为信任的监控机制实现对用户恶意匿名行为的控制,并且保证了发送者和接收者对匿名链路入口节点和出口节点的匿名性。通过与Tor匿名通信系统的比较,DC-ACS在具有匿名性的同时,具有更高的安全性和抗攻击的能力,解决了Tor匿名通信系统所存在的安全隐患。
With the development of network communication technology
the Tor anonymous communication system has been widely used.However
there are also some unsafe factors such as insufficient anonymity which deserves to be noticed.Thus
a diversified controllable anonymous communication system (DC-ACS) was proposed based on the node regional management strategy.The diversified anonymous link establishment mechanism chooses nodes in the corresponding field to build the anonymous communication link according to users’ needs
controls users’ malicious anonymous activities
and ensures the anonymity of senders and receivers to the first and last node of anonymous communication link.Compared with the Tor anonymous communication system
DC-ACS not only has anonymity
but also has higher security and anti-attack capability
which eliminated potential security risks existed in the Tor anonymous communications system.
CLAESSENS J , DIAZ C , GOEMANS C . Revocable anonymous access to the internet [A ] . Internet Research:Electronic Networking Application and Policy [C ] . 2003 . 13 - 25 .
吴艳辉 , 王伟平 , 陈建二 . 匿名通信研究综述 [J ] . 小型微型计算机系统 , 2007 , 4 ( 5 ): 583 - 587 .
WU Y H , WANG W P , CHEN J E . Anonymous communication:a survey [J ] . Journal of Chinese Computer Systems , 2007 , 4 ( 5 ): 583 - 587 .
SERJANTOW A Anonym zing censorship resistant systems [A ] . Proc of the lst Int Peer-to-Peer Systems Workshop [C ] . London , 2002 . 111 - 120 .
GOLDSCHLAG D , REED M , SYVERSON P . Onion routing for anonymous and private Internet connections [J ] . Communications of the ACM , 1999 , 42 ( 2 ): 39 - 41 .
DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second–generation onion router [A ] . Proc of the 13th USENIX Security Symp [C ] . Berkeley:USENIX Association , 2004 . 303 - 320 .
陈周国 , 蒲石 , 祝世雄 . 匿名网络追踪溯源综述 [J ] . 计算机研究与发展 , 2012 , 49 ( S2 ): 111 - 117 .
CHEN Z G , PU S , ZHU S X . Traceback technology for anonymous network [J ] . Journal of Computer Research and Development , 2012 , 49 ( S2 ): 111 - 117 .
REITER M K , RUBIN A D . Crowds:anonymity for Web transactions [J ] . ACM Trans on Information and System Security , 1998 , 1 ( 1 ): 66 - 92 .
FREEDMAN M J , MORRIS R . Tarzan:a peer-to-peer anonym zing net-work layer [A ] . Proc of the 9th ACM Conf on Computer and Communications Security [C ] . New York,USA , 2002 . 193 - 206 .
DANEZIS G,DINGLEDINE R,MATHEWSON N . Mixminion:design of a type III anonymous remailer protocol [A ] . Proc of the 2003 IEEE Symp on Security and Privacy [C ] . Washington,IEEE Computer Society , 2003 . 2 - 15 .
SHERWOOD R , BHATTACHARJEE B , SRINIVASAN A . P5:a protocol for scalable anonymous communication [J ] . Journal of Computer Secu-rity , 2005 , 13 ( 6 ): 839 - 876 .
CHAUM D . The dining cryptographer’s problem:unconditional sender and recipient untraceability [J ] . Journal of Cryptology , 1988 , 1 ( 1 ): 65 - 75 .
陆天波 . P2P匿名通信协议WonGoo研究 [D ] . 北京:中国科学院大学 , 2006 .
LU T B . Research on WonGoo—A Peer-to-Peer Anonymous Communication Protocol [D ] . Beijing:Chinese University Academy of Sciences , 2006 .
刘鑫 . 基于 Tor 网络的匿名通信研究 [D ] . 上海:华东师范大学, 2011 .
LIU X . Research on Anonymous Communication Based on Tor Network [D ] . Shanghai:East China Normal University , 2011 .
杨元原 . 一种混合的Tor通信系统方案 [D ] . 西安:西安电子科技大学 , 2007 .
YANG Y Y . A Mixed Tor Anonymous Communication System Scheme [D ] . Xi’an:Xi’an University of Electronic Science and Technology , 2007 .
吴振强 , 周彦伟 , 乔子芮 . 一种可控可信的匿名通信方案 [J ] . 计算机学报 , 2010 , 33 ( 9 ): 1686 - 1702 .
WU Z Q , ZHOU Y W , QIAO Z R . A controllable and trusted anonymous communication scheme [J ] . Chinese Journal of Computers , 2010 , 33 ( 9 ): 1686 - 1702 .
周彦伟 , 吴振强 , 蒋李 . 分布式网络环境下的跨域匿名认证机制 [J ] . 计算机应用 , 2010 , 30 ( 8 ): 2120 - 2124 .
ZHOU Y W , WU Z Q , JIANG L . Cross-domain mecha-nismof anonymous attestation for distributed network [J ] . Journal of Computer Applications , 2010 , 30 ( 8 ): 2120 - 2124 .
周彦伟 , 吴振强 , 乔子芮 . 可信匿名接入认证协议的研究与设计 [J ] . 计算机工程 , 2011 , 37 ( 5 ): 143 - 145 .
ZHOU Y W , WU Z Q , QIAO Z R . Research and design of trusted anonymous authentication protocol [J ] . Computer Engineering , 2011 , 37 ( 5 ): 143 - 145 .
林闯 , 田立勤 , 王元卓 . 可信网络中用户行为可信的研究 [J ] .计算机研究与发展.2008,45(12):2033 -2043.
LIN C , TIAN L Q , WANG Y Z . Research on user behavior trust in trustworthy network [J ] . Journal of Computer Research and Development , 2008 , 45 ( 12 ): 2033 - 2043 .
刘巍伟 , 韩臻 , 沈昌祥 . 基于终端行为的可信网络连接控制方案 [J ] . 通信学报 , 2009 , 30 ( 11 ): 127 - 134 .
LIU W W , HAN Z , SHEN C X . Trusted network connect control based on terminal behavior [J ] . Journal on Communications , 2009 , 30 ( 11 ): 127 - 134 .
吴振强 . 匿名技术的抗攻击性研究 [J ] . 陕西师范大学学报(自然科学版) , 2004 , 32 ( 1 ): 29 - 32 .
WU Z Q . Anonymous communications for attack resistant [J ] . Journal of Shaanxi Normal University (Natural Science Edition) , 2004 , 32 ( 1 ): 29 - 32 .
REITER M K , RUBIN A D . Crowds:anonymity for Web transactions [J ] . ACM Transactions on Information and System Security , 1998 , 1 ( 1 ): 62 - 92 .
吴振强 , 周彦伟 , 马建峰 . 物联网安全传输模型 [J ] . 计算机学报 , 2011 , 34 ( 8 ): 1351 - 1364 .
WU Z Q , ZHOU Y W , MA J F . A security transmission model for Internet of things [J ] . Chinese Journal of Computers , 2011 , 34 ( 8 ): 1351 - 1364 .
0
浏览量
1037
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构