期刊文献+

一种隐匿网络结构实现方案及安全性分析 被引量:1

Hiding Network Architecture and Its Security Analysis
下载PDF
导出
摘要 在公开的计算机网络中采用洋葱路由能提供隐蔽网络连接,实现隐藏网络结构和通信双方地址等关键信息,对通信的数据进行安全保护,然而洋葱路由技术对数据包经过的中继节点需要进行层层加密封装,从而降低路由转发效率,增大资源消耗。针对此问题,提出了一种改进的隐匿网络结构方案,使得数据传输路径随机化。数据从发送端发送,发送端要把发送的数据提前分成若干部分,每部分通过一系列的代理且沿一条不可预测的路径发送信息,直到目的地址。对方案的安全性分析以及实验结果表明:该方案具有隐匿网络结构、防止攻击者流量分析及保证数据的保密性的特点,有效地解决了路由转发效率低下的问题。 Onion Routing in open computer networks can offer anonymous network connections and hide the network structure and key information of the communication, thus to hide communication over Internet. However, Onion Routing needs to encrypt and encapsulate packets layer by layer on each node, thereby reducing forwarding efficiency and increasing resource consumption. To solve this problem, a new scheme based on Onion Routing is proposed. The new scheme randomizes the data transmission path. The sender divides the data into several parts before sending, and each part is forwarded through a series of agents and along an unpredictable path to the destination address. Analysis and experimental results show that the scheme can hide the network structure, prevent flow analysis, ensure data confidentiality, and effectively improves the routing efficiency.
出处 《信息工程大学学报》 2016年第6期719-723,共5页 Journal of Information Engineering University
基金 上海市科研计划资助项目(14DZ1105300 13DZ1108800)
关键词 网络安全 洋葱路由 保密性 network security Onion Routing confidentiality
  • 相关文献

参考文献8

二级参考文献74

  • 1CHAUM D L. Untraceable Electronic Mail, Return Addresses, and Digital Pscudonyms[J]. Communications of the ACM, 1981, 24(2): 84-88. 被引量:1
  • 2REED M G, SYVERSON P F. Anonymous Connections and Onion Routing[J]. IEEE Journal on Selected Areas in Communication-Special Issue on Copyright and Privacy Protection, 1998, 16(4): 482-494. 被引量:1
  • 3JORIS Claessens, CLAUDIA Diaz, CAROLINE Goemans, et al. Revocable Anonymous Access to the Internet [J]. Journal of Internet Research: Electronic Networking Applications and Policy, 2003 : 13(4) : 242-258. 被引量:1
  • 4ZHANG Jianhong, YANG Yixian. On the Security of a Proxy Ring Signature with Revocable Anonymity [J]. International Conference on Multimedia Information Networking and Security, 2009, 1: 205-209. 被引量:1
  • 5DINGLEDINE R, MATHEWSON N, SYVERSON P. Deploying Low-latency Anonymity: Design Challenges and Social Factors[J]. IEEE Security and Privacy, 2007, 5(5) : 83-87. 被引量:1
  • 6王育民,通信网的安全.理论与技术,1999年 被引量:1
  • 7杨元原,马文平,白晓峰.一种混合的Tor匿名通信系统[J].计算机应用研究,2007,24(10):141-144. 被引量:13
  • 8CHAUM D. Untraceable electronic mail, return addresses, and digital pseudonyms[J]. Communications of the ACM, 1981, 24(2):84-88. 被引量:1
  • 9MOLLER U, COTTRELL L, PALFRADER E Mixmaster proto- col-version 2[EB/OL]. http://www.eskimo.com/rowdenw/crypt/Mix/ draft-moeller-mixmaster2-protocol-00.txt, 2003. 被引量:1
  • 10DANEZIS G, DINGLEDINE R, MATHEWSON N. Mixminion: design of a type III anonymous remailer protocol[A]. Proceedings of the 2003 IEEE Symposium on Security and Privacy[C]. Oakland, California, USA, 2003.2-15. 被引量:1

共引文献53

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部