Font Size: a A A

A Design Of Safely Anonymous Communication

Posted on:2006-12-14Degree:MasterType:Thesis
Country:ChinaCandidate:S TangFull Text:PDF
GTID:2178360182970158Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of global communication, the network is used as a mean to deliver information. It is important to the development of economy and the communication among people. However, while the blooming development of internet, the security of network is becoming an anxious problem. To strengthen the security of Internet, we have adopted many anonymous communications and have got some efforts. However, some disadvantages still exist.In this paper, we first analyze the actuality of anonymous communication, introduce IPSec protocol and study a safely anonymous communication protocol base on IPSec. It adopts ameliorative IPSec.Our design combines the merits of IPSec and anonymous communication. It provides bi-directional, real-time anonymous Internet communication. IPSec is an excellent approach for secure communication over the Internet. Based on IPSec, we present an anonymous Internet communication using IP tunnel at IP layer. It provides bi-directional, real-time communication for any TCP and UDP applications, including the end-to-end IPSec, VPN, SSL, etc. Three advantages for our technique are as follows. First, unlike other anonymous communication networks, it is independent of all applications over IP. Second, Unlike Onion Routing and MIX-Network, packet loss causes a problem of network backlog and cascading retransmits, since the nodes talk to each other via TCP in these networks. The end-to-end TCP is not available in them. Third, unlike Freedom Network, in our anonymous Internet architecture, the source address and destination address of the user's data are changed through every node, but every node only needs one public IP address because we use the different IP tunnels to distinguish the different end-to-end IP-datagram streams. Thus, it supports both IPv4 and IPv6.In the end of our paper, We described the concretely design of our architecture. And we also analyse its security.
Keywords/Search Tags:Internet security, anonymous communication, IPSec
PDF Full Text Request
Related items