通信学报 ›› 2015, Vol. 36 ›› Issue (6): 105-115.doi: 10.11959/j.issn.1000-436x.2015138

• 学术论文 • 上一篇    下一篇

多样化的可控匿名通信系统

周彦伟,吴振强,杨波   

  1. 陕西师范大学 计算机科学学院,陕西 西安 710062
  • 出版日期:2015-06-25 发布日期:2017-05-11
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;陕西省自然科学基金资助项目;保密通信重点实验室基金资助项目;中国科学院信息工程研究所信息安全国家重点实验室开放课题基金资助项目;中央高校基本科研业务费专项基金资助项目;中央高校基本科研业务费专项基金资助项目

Diversity of controllable anonymous communication system

Yan-wei ZHOU,Zhen-qiang WU,Bo YANG   

  1. School of Computer Science,Shaanxi Normal University,Xi ' an 710062,China
  • Online:2015-06-25 Published:2017-05-11
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Foundation of Science and Technology on Communication Security Laboratory;The Foundation of State Key Laboratory of Information Security

摘要:

随着网络通信技术的发展,Tor 匿名通信系统在得到广泛应用的同时暴露出匿名性较弱等不安全因素,针对上述问题,基于节点的区域管理策略提出一种多样化的可控匿名通信系统(DC-ACS),DC-ACS中多样化匿名链路建立机制根据用户需求选择相应区域的节点完成匿名通信链路的建立,同时基于行为信任的监控机制实现对用户恶意匿名行为的控制,并且保证了发送者和接收者对匿名链路入口节点和出口节点的匿名性。通过与Tor匿名通信系统的比较,DC-ACS在具有匿名性的同时,具有更高的安全性和抗攻击的能力,解决了Tor匿名通信系统所存在的安全隐患。

关键词: 匿名通信系统, Tor, 信任评估, 多样性

Abstract:

With the development of network communication technology,the Tor anonymous communication system has been widely used.However,there are also some unsafe factors such as insufficient anonymity which deserves to be noticed.Thus,a diversified controllable anonymous communication system (DC-ACS) was proposed based on the node regional management strategy.The diversified anonymous link establishment mechanism chooses nodes in the corresponding field to build the anonymous communication link according to users’ needs,controls users’ malicious anonymous activities,and ensures the anonymity of senders and receivers to the first and last node of anonymous communication link.Compared with the Tor anonymous communication system,DC-ACS not only has anonymity,but also has higher security and anti-attack capability,which eliminated potential security risks existed in the Tor anonymous communications system.

Key words: anonymous communication system, Tor, credible appraisal, diversity