Font Size: a A A

Research And Implementation Of Rerouting-based Anonymous Communication System

Posted on:2017-03-12Degree:MasterType:Thesis
Country:ChinaCandidate:J H JiangFull Text:PDF
GTID:2308330491950800Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the popularity of Internet technology, network communication security and user privacy security issues have become increasingly prominent, the network attackers continue to improve the ability to attack and novel attack modes to the vast number of users of communication brought great distress, at this stage many attackers through analysis of both sides of communication address information and traffic information to infer some valuable information to target implementation effective attack, at this stage many attackers through analysis of both sides of communication address information and traffic information to infer some valuable information to target implementation effective attack.In recent years, with unceasing development of anonymous communication technology, scholars pay more and more attention to all kinds of anonymous communication mechanism, and anonymous communication implementation method is to measure the key to the anonymity of the strength of the anonymous communication system, so research for anonymous communication systems is very important.This thesis first discusses the basic concept of anonymous communication technology, through the qualitative analysis and quantitative analysis launched a anonymous performance evaluation; this paper introduces the key technologies of anonymous communication and the typical anonymous communication system, and points out the research status and development prospects of anonymous communication technology.Secondly, based on the analysis of the current anonymous communication system, to realize the anonymous communication between different users, a new method is presented to combine the Variable Length strategy and the Next-hop Routing Selecting strategy in the Rerouting mechanism to establish the anonymous communication path. Besides, this new method also introduces the Probabilistic forwarding mechanism and Encryption mechanism. Moreover, we apply the P2 P work method which is based on multi-server coordinating technology to enhance the stability of the anonymous communication system and increase the ability to resist attack. The new scheme also introduces the fragmentation-redundancy mechanism to protect the communication messages and to maintain the anonymous forwarding path.Finally, through the realization of the prototype system and the function of the test system, it is known that the system implementation scheme is very feasible, and theoretical analysis and experimental results show that our scheme performs better than existing work in both stability and anonymity.
Keywords/Search Tags:Anonymous Communication, Rerouting mechanism, Encryption mechanism, Fragmentation Redundancy
PDF Full Text Request
Related items