检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]徐州工程学院信息工程学院(大数据学院),江苏 徐州
出 处:《计算机科学与应用》2023年第5期1055-1064,共10页Computer Science and Application
摘 要:在大数据时代背景下,隐私保护和网络安全问题受到广泛关注。为应对挑战,本文提出了基于TUN设备的点对点虚拟专用网络(P2PVPN)设计方案,利用TUN设备构建虚拟网络接口,并采用分布式路由表管理节点间通信。该方案采用了基于ed25519非对称加密的去中心化网络节点结构,提高数据传输安全性,具备跨平台运行能力,实现高通用性。实验验证表明,该设计在性能和安全性方面优异。与传统VPN相比,P2PVPN允许用户在无需第三方服务器情况下进行点对点通信,因此可以完全抵御DoS攻击,使数据传输更加安全稳定,为用户带来灵活、可靠、高效的P2PVPN服务体验。Privacy protection and network security concerns have received widespread attention in the context of the big data era. This paper proposes a design scheme for a point-to-point virtual private network (P2PVPN) based on TUN devices to address these challenges. The scheme employs TUN devices to create virtual network interfaces and utilizes distributed routing tables to manage communication between nodes. In addition, the proposed solution adopts a decentralized network node structure that is based on ed25519 asymmetric encryption to enhance data transmission security. The design offers cross-platform operability and boasts high versatility. Experimental verification indicates that the proposed P2PVPN design exhibits excellent performance and security. Furthermore, in contrast to traditional VPNs, P2PVPN enables peer-to-peer communication without the need for third-party servers, rendering it impervious to DoS attacks. As a result, data transmission becomes more secure and stable, providing users with a flexible, reliable, and efficient P2PVPN service experience.
关 键 词:虚拟私人网络 Tun/Tap设备 网络安全 Linux网络协议栈
分 类 号:TP3[自动化与计算机技术—计算机科学与技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7