Font Size: a A A

Mobile Anonymous Internet Technology And Applications

Posted on:2009-02-18Degree:MasterType:Thesis
Country:ChinaCandidate:X C JianFull Text:PDF
GTID:2208360272972957Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The rapid development of information network technology makes the wireless Internet evolves to the Mobile Internet, the using of Mobile Internet gets involve into the government, military and commerce. The Mobile Internet has its own features, such as, the dynamic changing of the topology structure, the open links, the limited bandwidth, the resources for computing and some other new business. These features make the user's private information leak out more easily. Commonly used encryption and signature technology can only protect their communications secrets, but can not resist flow attacks. Such attackers can intercept and analyze the information of the data packet's head, and receive the identity of sender and receiver, then deduce the information of the both sides.With the increasing requirements of the social and individual privacy protection, more and more users can not satisfied with the content protection alone, they also need to protect their communication data. Anonymous communications can hide the sender, the recipient, and their relation of them, thus can resist the flow attack and protect the privacy of users. This paper studies the existing anonymous technology, and then offers a dynamic address hidden anonymous source technology. Using this new anonymous technology into the mobile Internet Location-Based Services (LBS), this paper realizes the privacy protection by the methods of user identification anonymous. The main results as followed.(1) To meet the demand of mobile Internet's characteristics and needs, a dynamic address hidden anonymous source technology will be introduced. Through changing the source address in the IP layer to hide the sender's address. this technology can send the text with an anonymity dynamic path, change the source address with the intermediate nodes address, encrypt the middle node records, and form a address data like an onion, which the source address in the core and the final jump node address in the outer layer. Following the onion address data, the text will be sent back, and guaranteed the anonymous sender effectively. This technology has the advantages such as fit to anonymous dynamic topology, highly anonymous and small cost, and very suitable for the anonymous communications through the mobile Internet.(2) Fit to the privacy protection issues in the mobile Internet LBS problems, a new method of layer anonymous user label is introduced, and then solves the location privacy leaking problem. The method makes a fake name for the application-level users by the user terminals, and uses the dynamic anonymous method mentioned below in the transmission. The act of layered anonymous can remove the link between the user ID and the location, in order to protect the privacy better.(3) Simulation two mobile Internet scenes, and collecting its network characteristics, the expectation of node connectivity and the expectation of link chain length, then calculate the degree of anonymity. The analysis showed, the anonymous technology introduced by this paper has a high degree of anonymity, can provide a smooth communication services for the mobile Internet.
Keywords/Search Tags:Mobile Internet, Anonymous Technology, dynamic Ensconce Source Address, Location Privacy Protection, Layer Anonymous User label
PDF Full Text Request
Related items