[1]何高峰,罗军舟.G-Hordes:一种安全的匿名通信系统[J].东南大学学报(自然科学版),2009,39(2):220-224.[doi:10.3969/j.issn.1001-0505.2009.02.007]
 He Gaofeng,Luo Junzhou.G-Hordes: a safe anonymous communication system[J].Journal of Southeast University (Natural Science Edition),2009,39(2):220-224.[doi:10.3969/j.issn.1001-0505.2009.02.007]
点击复制

G-Hordes:一种安全的匿名通信系统()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
39
期数:
2009年第2期
页码:
220-224
栏目:
计算机科学与工程
出版日期:
2009-03-20

文章信息/Info

Title:
G-Hordes: a safe anonymous communication system
作者:
何高峰 罗军舟
东南大学计算机科学与工程学院, 南京 210096
Author(s):
He Gaofeng Luo Junzhou
School of Computer Science and Engineering,Southeast University,Nanjing 210096,China
关键词:
匿名通信系统 G-Hordes 前驱攻击
Keywords:
anonymous communication system G-Hordes predecessor attack
分类号:
TP309
DOI:
10.3969/j.issn.1001-0505.2009.02.007
摘要:
在Hordes匿名通信系统的基础上,提出了一种新型安全的G-Hordes匿名通信系统.该系统由Guard Mixes与Hordes级联组成,其中Guard Mixes由Mix Cascade构成,可由可信第三方部署.用户选择部分Hordes节点作为洋葱报文目的地址集合,并在该集合中任选一节点作为Hordes起始转发节点,其余节点因不能正确解密而将接收到的报文丢弃.数据传输过程为:先发送报文给Guard Mixes,经Mix Cascade层层解密与混淆后传至正确转发节点,最后经Hordes转发到达接收者.分析表明,G-Hordes不仅能够有效抵抗前驱攻击,而且在整体上比Hordes和Mix Cascade更安全.此外,还对G-Hordes的网络延时进行了分析说明,指出可根据实际情况对Mix Cascade配置适当长度以达到系统性能与安全性之间的平衡.这为抵御前驱攻击及设计更加安全的匿名通信系统奠定了基础.
Abstract:
G-Hordes,a novel safe anonymous communication system based on the Hordes anonymous communication system,is proposed.The G-Hordes is a cascade of the Guard Mixes and Hordes,and the former is composed of Mix cascades which may be deployed by trusted third parties.User chooses some Hordes nodes as the destination address set of the onion packet,and randomly picks up one node from the set to be the first forwarding node of Hordes.Other nodes discard the packet once received as it can not be correctly decrypted.The process of data transmission is as follows.Firstly packets are sent to the Guard Mixes.Then,they are transmitted to their correct forwarding nodes after decrypted layer by layer and mixed by Mix Cascade.Finally they are received by receivers through the Hordes’ forward.The results show that the G-Hordes can resist the predecessor attack effectively, moreover it is safer than the Hordes and Mix cascade on the whole.In addition,the network latency of the G-Hordes is analyzed and the suitable Mix Cascade’s length can be configured to obtain the balance of system performance and security based on practical applications.This work paves the way for the defense of the predecessor attack and the design of more secure anonymous communication systems.

参考文献/References:

[1] Serjantov A,Dingledine R,Syverson P.From a trickle to a flood:active attacks on several mix types [C] //Proc of 5th International Information Hiding Workshop.Noordwijkerhout,Netherlands,2002:36-52.
[2] Shields C,Levine B N.A protocol for anonymous communication over the Internet [C] //Proc of the 7th ACM Conference on Computer and Communication Security.Athens,Greece,2000:33-42.
[3] Reiter M K,Rubin A D.Crowds:anonymity for Web transactions [J].ACM Transaction on Information and System Security,1998,1(1):66-92.
[4] Freedman M J,Morris R.Tarzan:a peer-to-peer anonymizing network layer [C] //Proc of the 9th ACM Conference on Computer and Communications Security.New York,USA,2002:193-206.
[5] Rennhard M,Plattner B.Introducing MorphMix:peer-to-peer based anonymous Internet usage with collusion detection [C] //The Workshop on Privacy in the Electronic Society.Washington,USA,2002:91-102.
[6] Sherwood R,Bhattacharjee B,Srinivasan A.P5:a protocol for scalable anonymous communication [J].Computer Security,2005,13(6):839-876.
[7] Wright M,Adler M,Levine B N,et al.Defending anonymous communication against passive logging attacks [C] //Proc of the IEEE Symposium on Security and Privacy.Berkeley,USA,2003:28-41.
[8] Wright M K,Adler M,Levine B N,et al.The predecessor attack:an analysis of a threat to anonymous communications systems [J].ACM Transaction on Information System Security,2004,7(4):489-522.
[9] Wright M K,Adler M,Levine B N,et al.Passive-logging attacks against anonymous communications systems [J].ACM Transaction on Information System Security,2008,11(2):59-92.
[10] Dingledine R,Mathewson N,Syverson P.Tor:the second-generation onion router [C] //Proc of the 13th USENIX Security Symposium.San Diego,USA,2004:21-38.
[11] Tabriz P,Borisov N.Breaking the collusion detection mechanism of MorphMix [C] //Proc of Privacy Enhancing Technologies Workshop.Berlin:Springer-Verlag,2006:368-383.
[12] Berthold O,Pfitzmann A,Standtke R.The disadvantages of free MIX routes and how to overcome them [C] //Proc of Designing Privacy Enhancing Technologies:Workshop on Design Issues in Anonymity and Unobservability.Berlin:Springer-Verlag,2000:30-45.

相似文献/References:

[1]傅翀,钱伟中,赵明渊,等.匿名通信系统时间攻击的时延规范化防御方法[J].东南大学学报(自然科学版),2009,39(4):738.[doi:10.3969/j.issn.1001-0505.2009.04.017]
 Fu Chong,Qian Weizhong,Zhao Mingyuan,et al.Delay normalization method of defending against timing-based attacks on anonymous communication systems[J].Journal of Southeast University (Natural Science Edition),2009,39(2):738.[doi:10.3969/j.issn.1001-0505.2009.04.017]

备注/Memo

备注/Memo:
作者简介: 何高峰(1984— ), 男, 博士生; 罗军舟(联系人), 男, 博士, 教授, 博士生导师, jluo@seu.edu.cn.
基金项目: 江苏省自然科学基金资助项目(BK2007708)、江苏省网络与信息安全重点实验室资助项目(BM2003201)、计算机网络和信息集成教育部重点实验室资助项目(93K-9)、科技部国际科技合作资助项目.
引文格式: 何高峰,罗军舟.G-Hordes:一种安全的匿名通信系统[J].东南大学学报:自然科学版,2009,39(2):220-224.
更新日期/Last Update: 2009-03-20