检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]陕西师范大学计算机科学学院,陕西西安710062
出 处:《通信学报》2015年第6期105-115,共11页Journal on Communications
基 金:国家自然科学基金资助项目(61272436;61402275);陕西省自然科学基金资助项目(2014JQ8309);保密通信重点实验室基金资助项目(9140C110206140C11050);中国科学院信息工程研究所信息安全国家重点实验室开放课题基金资助项目(2015-MS-10);中央高校基本科研业务费专项基金资助项目(GK201504016;GK20130205)~~
摘 要:随着网络通信技术的发展,Tor匿名通信系统在得到广泛应用的同时暴露出匿名性较弱等不安全因素,针对上述问题,基于节点的区域管理策略提出一种多样化的可控匿名通信系统(DC-ACS),DC-ACS中多样化匿名链路建立机制根据用户需求选择相应区域的节点完成匿名通信链路的建立,同时基于行为信任的监控机制实现对用户恶意匿名行为的控制,并且保证了发送者和接收者对匿名链路入口节点和出口节点的匿名性。通过与Tor匿名通信系统的比较,DC-ACS在具有匿名性的同时,具有更高的安全性和抗攻击的能力,解决了Tor匿名通信系统所存在的安全隐患。With the development of network communication technology, the Tor anonymous communication system has been widely used. However, there are also some unsafe factors such as insufficient anonymity which deserves to be noticed. Thus, a diversified controllable anonymous communication system(DC-ACS) was proposed based on the node regional management strategy. The diversified anonymous link establishment mechanism chooses nodes in the corresponding field to build the anonymous communication link according to users' needs, controls users' malicious anonymous activities, and ensures the anonymity of senders and receivers to the first and last node of anonymous communication link. Compared with the Tor anonymous communication system, DC-ACS not only has anonymity, but also has higher security and anti-attack capability, which eliminated potential security risks existed in the Tor anonymous communications system.
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222