首页 | 本学科首页   官方微博 | 高级检索  
     

基于Tor的混合匿名转发系统
引用本文:郑光,薛质. 基于Tor的混合匿名转发系统[J]. 信息安全与通信保密, 2011, 9(12): 76-77,80
作者姓名:郑光  薛质
作者单位:上海交通大学信息安全工程学院,上海,200240
摘    要:随着互联网应用的不断增加,人们对网络通信的保密性也越来越重视。Tor匿名通信系统具有低时延、数据加密传输,安全信道等优点,能够有效保护通信者的信息安全,目前正成为一种流行的匿名通信系统。但随着Tor系统使用和研究的人增多,Tor系统本身的一些缺陷给其安全带来了隐患。为此,在现有Tor系统分析的基础上,文中提出了一种安全新型的混合匿名转发系统H—Tor。该系统由Hordes和Tor有效级联组合,充分发挥了两者的优势。分析表明,H—Tor可以抵御通信流攻击和端对端攻击,有效保护通信者的匿名安全。

关 键 词:洋葱路由  Tor  匿名通信  网络安全

A Mixed Anonymous System based on Tor
ZHENG Guang,XUE Zhi. A Mixed Anonymous System based on Tor[J]. China Information Security, 2011, 9(12): 76-77,80
Authors:ZHENG Guang  XUE Zhi
Affiliation:ZHENG Guang,XUE Zhi(School of Information Security Engineering,SJTU,Shanghai 200240,China)
Abstract:With the continuous increase of lnternet applications, people pay much attention to the confidentiality of network communications. Tor anonymous communication system, with low latency, data eneryption transmission, secure channel, etc., could effectively protect the information security of the correspondents, and thus becomes a popular anonymous communication system. However, with in-depth study wide use of the Tor system, Tor presents some defects in security risks. Currently, a new system called H-Tor is proposed upon the analysis of Tor. The system combines Hordes with Tor and gives full play to their advantages. Analysis shows that the H-Tor integration can effectively protect the anonymity of the correspondents.
Keywords:onion routing  TOR  anonymous communication  network security
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号