Font Size: a A A

Research On P2P-based Anonymous Communication Mechanism

Posted on:2012-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:B LiFull Text:PDF
GTID:2248330395485663Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapidly development of network technology in the whole world, Internet brings many advantages to human society as well as the problem of information security. More and more people focus on the safety of their real identity and privacy, so the anonymous communication technology come into being. With Internet developing, as an important distributed computing technology, P2P is used broadly in file sharing, peer computing and cooperative work. The P2P network’s openness and the malicious node’s unpredictability, make the privacy of the network user to be easier to illegally eavesdrop. The attacker can obtain not only the contents of the files being transferred but also the identity of sender and receiver. The best method of solving the privacy protection is the anonymous technique, so it has the important theory meaning and application value to study the anonymous technique in P2P network.This paper studies the P2P network communication issues, the main work anonymous include the following aspects:(1) P2P networks and anonymous communications technology basic concept, research status and the main technology of the existing P2P networks and anonymous communications system were introduced.(2) P2P networks in different topology structure performance differences may affect the node system efficiency problem, and anonymity demand problems, adopted a PP-Tree, combining with the network topological structure of the principle of P2P anonymous communication system, this paper proposes a new data packet filling anonymous communication mechanism.(3) Anonymous communication mechanism of heavy routing performance problems, this paper puts forward the grouping of filling anonymous mechanism using NS2tools for a heavy routing performance, anonymity two different aspects of the test. Test results show that based on PP-Tree topology network structure Tree model can be simulated accomplished; The data form based on group filling in sending process, data security also have certain security; Meanwhile the sender and receiver between, PP-Tree topology structure, in the middle of the node chooses the appropriate value only, ability assures the entire mechanism and efficient and effective.
Keywords/Search Tags:P2P Networks, Anonymous Communication, Grouping filling
PDF Full Text Request
Related items