| With the continuous development and improvement of Internet technology,and its popularization growing in global society in dacates,the Internet,as an efficient and convenient information transmission tool,has already been applied to many industries.On the one hand,with the development of the Internet and medias,people’s awareness of privacy is gradually increasing.The emergence of hidden tunnels is conducive to protecting user privacy on the Internet,such as user communication behavior and communication data.On the other hand,hidden tunnels based on the Internet provide more secure information transmission channels for special industries and their employees.Nowadays,the public hidden transmission technology in the Internet is mainly composed of onion routing technology and garlic routing technology.The Tor anonymous network is a typical application of onion routing technology.A proprietary hidden tunnel with multi-level encryption and multi-level transmission is constructed through the transmission nodes in the anonymous network to realize the hidden transmission of data;the garlic routing technology is applied to the I2 P anonymous network.The I2 P hidden tunnel of the anonymous network adopts the method of data uplink and downlink isolation,and constructs multiple multi-level transmission tunnels to respectively undertake unidirectional data transmission tasks.At the network level,Tor uses a network topology that combines a directory server and a transmission server,while I2 P uses a distributed database to maintain the network.The advantage of using a public anonymous network to construct a hidden tunnel for data transmission lies in the real-time nature of the tunnel,thereby reducing the risk of the transmission tunnel being tracked.But at the same time,the shortcomings of public anonymous networks are the sacrifices they make to transmission performance to ensure data security,and public anonymous networks are more vulnerable to attacks.The nodes in the private network are all controllable and trustworthy nodes,so the hidden tunnel constructed based on the private network has better transmission efficiency,and the trustworthiness of the nodes also greatly improves the security of the hidden tunnel.However,the nodes of the private network have certain limitations,which are determined by the nature of the private network.This paper synthesizes the advantages and disadvantages of the public anonymous network and the hidden tunnel under the private network.The hidden tunnel technology should have the characteristics of diversified node networks,and the untrusted relay node is the basic principle of constructing the hidden transmission tunnel.Thus,a public and anonymous network with a high degree of self-adaptation and self-operation is formed,and a hidden and secure private transmission tunnel can be constructed by this network.The main content of this article is as follows:1.Anonymous network and hidden tunnel related technology research: in-depth study of current mainstream anonymous network related technology,understand the network form principle of anonymous network,the application of data hidden transmission technology and the advantages and disadvantages of security and transmission performance.2.Multi-link tunnel technology network model design: Propose a multi-link tunnel-based hidden transmission technology,and design a dynamic multi-link tunnel network topology suitable for different hidden transmission requirements.3.Data split transmission technology research and data split,transmission and confluence algorithm design: Research on the realization of data split transmission on the basis of multi-link tunnels,and study the corresponding algorithms to achieve multi-channel parallel transmission of segmented data.4.Research on node management scheme of distributed self-organizing transmission network: study the realization of decentralized anonymous transmission network,used to construct transmission network based on node self-organization,and focus on the management of node data in decentralized transmission network.5.Research on the link management scheme of the distributed self-organized transmission network: study the management of the links between nodes in the distributed self-organized transmission network,study the construction scheme of multi-link tunnels in the distributed self-organized transmission network,and the node-to-route data Management technology.Finally,the proxy access technology combined with the covert transmission feature proposed in this paper is compared with other commonly used proxy access technologies to prove that the scheme proposed in this paper has more advantages than other proxy access technologies in terms of efficiency and security.Similarly,the multi-link tunnel proposed in this article is compared with the multi-level transmission tunnel of the Tor anonymous network and the uplink and downlink isolation transmission tunnel of the I2 P anonymous network.Improve,and also have advantages in security and concealment. |