Font Size: a A A

Research On Security Query Technology In P2P Anonymous Communication System

Posted on:2019-10-12Degree:MasterType:Thesis
Country:ChinaCandidate:X H LiuFull Text:PDF
GTID:2438330548472665Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology,the Internet has brought great convenience to people's lives,but also face the security problems.The traditional encryption technology,such as alternative passwords,etc.can solve the security of forwarding messages between the two parties in communication,but can not guarantee the identity or the relationship security of both communication parties.In order to solve this problem,anonymous communication technology has become a hot spot in the field of communication.Tor is not a terminal encryption tool,but it is the widely used anonymous communication system based on rerouting technology.It is one of the important tools used by the Internet to protect people's privacy.As the size of the network increases,the structure of the Tor is limited and the peer-to-peer(P2P)anonymous communication systems are gradually developed.However,there are also some new challenges.In this paper,we present two methods to solve the problems in security query technology.What's more,we also analyze the security and anonymity under the two schemes respectively.We can get the conclusion that the they have good value for anonymous communication.The main work of this paper includes:First,P2 P networks based on distributed hash table(DHT)can effectively locate nodes,but the trustworthiness of the node cannot be determined,and it is easy to cause node failure.Based on the KAD network query,we introduce trust into the anonymous communication network,and proposes a trust-based an anonymous communication network for security inquiry.In the secure query method the nodes are selected by the ratio of the cedis tan between a given node and the target node against the trust value of node.By this way,high reliable nodes are selected in priority and thus the secure query method can effectively alleviate the node-failure problem in the network and improve the efficiency of message forwarding.Second,the key of anonymous communication system is the construction of path.mainly based on rerouting technology is to achieve the path construction of the anonymous communication.The main strategy is based on rerouting technology.However,the rerouting technology can not effectively control the length of the forwarding path,resulting in communication delay.In order to solve this problem,this paper introduces the decreasing forwarding probability in P2 P anonymous communication system.This method can control the length of the communication path effectively and reduce the communication delay.Third,in the anonymous communication system,an attacker steals or tampers interactive information in a certain way.To solve this problem,certificateless encryption and signature techniques are used during messages forwarding.It can ensure the confidentiality and security of the forwarded message.
Keywords/Search Tags:Anonymous communication, rerouting, decreasing probability, trust, P2P
PDF Full Text Request
Related items