Journal on Communications ›› 2015, Vol. 36 ›› Issue (6): 105-115.doi: 10.11959/j.issn.1000-436x.2015138
• Academic paper • Previous Articles Next Articles
Yan-wei ZHOU,Zhen-qiang WU,Bo YANG
Online:
2015-06-25
Published:
2017-05-11
Supported by:
Yan-wei ZHOU,Zhen-qiang WU,Bo YANG. Diversity of controllable anonymous communication system[J]. Journal on Communications, 2015, 36(6): 105-115.
"
属性名称 | 备注 |
network address(NA) | 节点的IP地址 |
physical location(PL)* | 节点具体所处的物理区域 |
node-family(NF) | 节点管理员配置的节点说明 |
public-key(PK) | 节点的洋葱公钥,即PKNode |
node-bandwidth(NB) | 节点可使用的平均带宽和分支带宽 |
speed-ranking(SR) * | 节点的带宽排序 |
node-uptime(NU) | 节点在线的持续时间/天 |
time-ranking(TR) * | 节点持续在线时长的排序 |
node-status(NS) | 节点的状态running:节点接收连接请求;hibernating:节点不接收连接请求 |
exit-policy(EP) | 出口策略,表示节点是否愿意成为出口节点 |
publication-timestamp (PT) | 节点最后一次接收消息的时间戳,即节点最后一次在线的时间 |
speed-mark(SPM) * | 速度标记,True表示快速节点 |
stable-mark(STM) * | 稳定性标记,True表示稳定节点 |
active-mark(ACM) * | 活跃性标记,True表示活跃节点 |
Tor-version(TV) | 节点当前Tor软件的版本信息 |
valid-mark(VM) * | 有效性标记,即节点在当前时间是否有效 |
注:带*的为本文扩充属性 |
[1] | CLAESSENS J , DIAZ C , GOEMANS C . Revocable anonymous access to the internet[A]. Internet Research:Electronic Networking Application and Policy[C]. 2003. 13-25. |
[2] | 吴艳辉, 王伟平, 陈建二 . 匿名通信研究综述[J]. 小型微型计算机系统, 2007,4(5): 583-587. WU Y H , WANG W P , CHEN J E . Anonymous communication:a survey[J]. Journal of Chinese Computer Systems, 2007,4(5): 583-587. |
[3] | SERJANTOW A Anonym zing censorship resistant systems[A]. Proc of the lst Int Peer-to-Peer Systems Workshop[C]. London, 2002. 111-120. |
[4] | GOLDSCHLAG D , REED M , SYVERSON P . Onion routing for anonymous and private Internet connections[J]. Communications of the ACM, 1999,42(2): 39-41. |
[5] | DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second–generation onion router[A]. Proc of the 13th USENIX Security Symp[C]. Berkeley:USENIX Association, 2004. 303-320. |
[6] | 陈周国, 蒲石, 祝世雄 . 匿名网络追踪溯源综述[J]. 计算机研究与发展, 2012,49(S2): 111-117. CHEN Z G , PU S , ZHU S X . Traceback technology for anonymous network[J]. Journal of Computer Research and Development, 2012,49(S2): 111-117. |
[7] | REITER M K , RUBIN A D . Crowds:anonymity for Web transactions[J]. ACM Trans on Information and System Security, 1998,1(1): 66-92. |
[8] | FREEDMAN M J , MORRIS R . Tarzan:a peer-to-peer anonym zing net-work layer[A]. Proc of the 9th ACM Conf on Computer and Communications Security[C]. New York,USA, 2002. 193-206. |
[9] | DANEZIS G,DINGLEDINE R,MATHEWSON N . Mixminion:design of a type III anonymous remailer protocol[A]. Proc of the 2003 IEEE Symp on Security and Privacy[C]. Washington,IEEE Computer Society, 2003. 2-15. |
[10] | SHERWOOD R , BHATTACHARJEE B , SRINIVASAN A . P5:a protocol for scalable anonymous communication[J]. Journal of Computer Secu-rity, 2005,13(6): 839-876. |
[11] | CHAUM D . The dining cryptographer’s problem:unconditional sender and recipient untraceability[J]. Journal of Cryptology, 1988,1(1): 65-75. |
[12] | 陆天波 . P2P匿名通信协议WonGoo研究[D]. 北京:中国科学院大学, 2006. LU T B . Research on WonGoo—A Peer-to-Peer Anonymous Communication Protocol[D]. Beijing:Chinese University Academy of Sciences, 2006. |
[13] | 刘鑫 . 基于 Tor 网络的匿名通信研究[D]. 上海:华东师范大学, 2011. LIU X . Research on Anonymous Communication Based on Tor Network[D]. Shanghai:East China Normal University, 2011. |
[14] | 杨元原 . 一种混合的Tor通信系统方案[D]. 西安:西安电子科技大学, 2007. YANG Y Y . A Mixed Tor Anonymous Communication System Scheme[D]. Xi’an:Xi’an University of Electronic Science and Technology, 2007. |
[15] | 吴振强, 周彦伟, 乔子芮 . 一种可控可信的匿名通信方案[J]. 计算机学报, 2010,33(9): 1686-1702. WU Z Q , ZHOU Y W , QIAO Z R . A controllable and trusted anonymous communication scheme[J]. Chinese Journal of Computers, 2010,33(9): 1686-1702. |
[16] | 周彦伟, 吴振强, 蒋李 . 分布式网络环境下的跨域匿名认证机制[J]. 计算机应用, 2010,30(8): 2120-2124. ZHOU Y W , WU Z Q , JIANG L . Cross-domain mecha-nismof anonymous attestation for distributed network[J]. Journal of Computer Applications, 2010,30(8): 2120-2124. |
[17] | 周彦伟, 吴振强, 乔子芮 . 可信匿名接入认证协议的研究与设计[J]. 计算机工程, 2011,37(5): 143-145. ZHOU Y W , WU Z Q , QIAO Z R . Research and design of trusted anonymous authentication protocol[J]. Computer Engineering, 2011,37(5): 143-145. |
[18] | 林闯, 田立勤, 王元卓 . 可信网络中用户行为可信的研究[J].计算机研究与发展.2008,45(12):2033 -2043. LIN C , TIAN L Q , WANG Y Z . Research on user behavior trust in trustworthy network[J]. Journal of Computer Research and Development, 2008,45(12): 2033-2043. |
[19] | 刘巍伟, 韩臻, 沈昌祥 . 基于终端行为的可信网络连接控制方案[J]. 通信学报, 2009,30(11): 127-134. LIU W W , HAN Z , SHEN C X . Trusted network connect control based on terminal behavior[J]. Journal on Communications, 2009,30(11): 127-134. |
[20] | 吴振强 . 匿名技术的抗攻击性研究[J]. 陕西师范大学学报(自然科学版), 2004,32(1): 29-32. WU Z Q . Anonymous communications for attack resistant[J]. Journal of Shaanxi Normal University (Natural Science Edition), 2004,32(1): 29-32. |
[21] | REITER M K , RUBIN A D . Crowds:anonymity for Web transactions[J]. ACM Transactions on Information and System Security, 1998,1(1): 62-92. |
[22] | 吴振强, 周彦伟, 马建峰 . 物联网安全传输模型[J]. 计算机学报, 2011,34(8): 1351-1364. WU Z Q , ZHOU Y W , MA J F . A security transmission model for Internet of things[J]. Chinese Journal of Computers, 2011,34(8): 1351-1364. |
[1] | Dongyu CHEN, Hua CHEN, Limin FAN, Yifang FU, Jian WANG. Research on test strategy for randomness based on deep learning [J]. Journal on Communications, 2023, 44(6): 23-33. |
[2] | Zhen ZHENG, Yingjian YAN, Juesong CAI, Yanjiang LIU. Non-specific TVLA method based on two-sample KS test [J]. Journal on Communications, 2023, 44(5): 137-147. |
[3] | Ping ZHANG, Jincheng DAI, Yuming ZHANG, Sixian WANG, Xiaoqi QIN, Kai NIU. Nonlinear transform coding for semantic communications [J]. Journal on Communications, 2023, 44(4): 1-14. |
[4] | Pujie JING, Liangmin WANG, Xuewen DONG, Yushu ZHANG, Qian WANG, Sohail Muhammad. CHA: cross-chain based hierarchical architecture for practicable blockchain regulatory [J]. Journal on Communications, 2023, 44(3): 93-104. |
[5] | Junfeng TIAN, Qianyu YANG, Xiao Jitian. Distributed audit causal consistency model based on biased stability [J]. Journal on Communications, 2023, 44(3): 164-177. |
[6] | Yuan XIE, Tao1 ZOU, Weijun SUN, Shengli XIE. Algorithm of underdetermined convolutive blind source separation for high reverberation environment [J]. Journal on Communications, 2023, 44(2): 82-93. |
[7] | Zheng YANG, Yun ZHENG, Yuehao YU, Yi WU, Zhicheng DONG, Song XING. Performance analysis for cooperative NOMA networks based SWIPT with adaptive power splitting [J]. Journal on Communications, 2023, 44(1): 177-188. |
[8] | Hao CHEN, Yuan YANG, Mingwei XU, Dan PEI, Yilin YOU. Parallel orchestration and deployment system for scalable heterogeneous service function chain supporting polymorphic network [J]. Journal on Communications, 2022, 43(9): 1-11. |
[9] | Guanxiong HA, Qiaowen JIA, Hang CHEN, Chunfu JIA. Data popularity-based encrypted deduplication scheme without third-party servers [J]. Journal on Communications, 2022, 43(8): 17-29. |
[10] | Runhua SHI, Hui YU, Weiyang KE, Xiaotong XU. Quantum anonymous one-vote veto protocol based on BB84 states [J]. Journal on Communications, 2022, 43(8): 109-120. |
[11] | Qihan ZHANG, Xiaoxue GONG, Rui LI, Xin LI, Shanguo HUANG, Lei GUO. All-optical pattern matching system of 42 Gbit/s 4-bit BPSK signals and its demonstration for optoelectronic firewall [J]. Journal on Communications, 2022, 43(7): 31-40. |
[12] | Ao LI, Cong FENG, Yutong NIU, Shibiao XU, Yingtao ZHANG, Guanglu SUN. Multiview clustering method for view-unaligned data [J]. Journal on Communications, 2022, 43(7): 143-152. |
[13] | Cuiran LI, Xuejie WANG, Jianli XIE, Anqi LYU. Routing algorithm for railway monitoring linear WSN based on improved PSO [J]. Journal on Communications, 2022, 43(5): 155-165. |
[14] | Zenghua ZHAO, Yuefan TONG, Jiayang CUI. Device-independent Wi-Fi fingerprinting indoor localization model based on domain adaptation [J]. Journal on Communications, 2022, 43(4): 143-153. |
[15] | Hailin FENG, Xiao ZHANG, Tongcun LIU. Recommendation model combining review’s feature and rating graph convolutional representation [J]. Journal on Communications, 2022, 43(3): 164-171. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|