Font Size: a A A

Research On Anonymous Communication Based On TOR

Posted on:2014-03-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhouFull Text:PDF
GTID:2298330431465684Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the popularization and development of computer network, our life and workmore and more depend on the Internet. While they get various convenience afforded bycomputer networks, personal privacy security more and more get attention. Attackerscan just use the loopholes of protocol to launch eavesdropping or traffic analysis attacks,they can obtain the identity information of both sides of communications, concludesome valuable information further, which will take huge losses to users. To protect theidentity information of communication entities, scientist put forward anonymouscommunication technology. Anonymous communication protects people’s privacy andconfidential communications via hiding the sender and recipient’s identity or thecommunication entities’ relationship.As an important branch research in the field ofinformation security, anonymous communication protects network user’s personalprivacy, also provide safe protection to defense military and other security departmentsprivate communications. Therefore, anonymous communication research has practicalsignificance.This thesis first analyzed the background, present situation, the concepts andtechnologies of anonymous communication. According to the different technology,several mature anonymous communication system were introduced. This article alsosimply introduced the advantages and disadvantages of these systems, explored thethreats mechanism and some typical attacks to anonymous communication system.As a basis for research in the field of anonymous communication, This thesisdeeply explored and analyzed Tor. Tor is the current most successful anonymouscommunication systems. On the basis of fully analyzing Tor, this article points out thedisadvantages of Tor in the theory and implementation. Aiming at the shortcomings ofthe theory, the thesis proposes the improvement project TCMAN, it is the anonymoussystem based on Tor. TCMAN can be divided into three parts: sender anonymousnetwork, forwarding network and receiver anonymity network. Sender anonymousnetwork using random store-and-forward mechanism similar to the Crowds can hide thereal sender in the sender anonymous network. Similar to Tor, forwarding networkestablish the anonymous link, the use of the sender and anonymous onion routing of thesecret key negotiations on a link to the packet layer upon layer encryption. By multicasttechnology the receiver anonymous network hide the recipient identity. Through the analysis of the anonymity, the project can effectively improve the anonymity. Aiming atthe shortcomings of the implementation, Based on Tor technology and C language, thethesis designs the terminal anonymous system. The test results indicate the data packageby Tor sending is enciphered data with packaging, which indicate the system hides andprotects the real identity effectively. The terminal anonymous system is very simplyoperated and software integration and human interface design, after simply config, youcan visit web anonymously by Tor.
Keywords/Search Tags:Anonymous Communications, Onion Routing, Tor, TCMAN, Terminal Anonymous System
PDF Full Text Request
Related items