|Table of Contents|

Security Analysis of Anonymous Network I2P(PDF)

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

Issue:
2018年03期
Page:
10-
Research Field:
人工智能算法与应用专栏
Publishing date:

Info

Title:
Security Analysis of Anonymous Network I2P
Author(s):
Li LingyanWei QingzhengYang YunShi TingjunHe Xingya
College of Information Engineering,Yangzhou University,Yangzhou 225127,China
Keywords:
anonymous network I2PKad algorithmsecurity
PACS:
TP393
DOI:
10.3969/j.issn.1672-1292.2018.03.002
Abstract:
I2P(invisible Internet project)is one of the most widely used anonymous networks. It uses garlic routing to hide the relationship between both sides of communication. It uses a strong encryption protocol and a network layer to hide the user identity and provide hidden services,thus acheiving the purpose of full anonymity. But it also has many security issues. Through the analysis of the system structure,working principle and garlic routing technology of I2P network,the problems of I2P are pointed out,and the solution ideas and technical ideas are given.

References:

[1] 高俊杰. I2P匿名通信系统优化与实现[D]. 北京:北京大学,2014.
GAO J J. The optimization and implementation of I2P anonymous communication system [D]. Beijing:Peking University,2014.(in Chinese)
[2]ANON. I2P[EB/OL].(2018-07-02). https://zh.wikipedia.org/zh-hans/I2P.
[3]周勇. 基于Tor的匿名通信研究[D]. 西安:西安电子科技大学,2013.
ZHOU Y. Research on anonymous communication based on TOR[D]. Xi’an: Xidian University,2013.(in Chinese)
[4]DAVID C. Mix-Net[EB/OL].(2018-07-03). https://en.wikipedia.org/wiki/Mix_network.
[5]黄文杰. 基于Tor网络的随机均匀分布路由算法[D]. 上海:上海交通大学,2012.
HUANG W J. Uniform distribution routing algorithm based on Tor network[D]. Shanghai:Shanghai Jiao Tong University,2012.(in Chinese)
[6]ANON. Tor[EB/OL].(2018-06-28)https://zh.wikipedia.org/zh-hans/Tor.
[7]周彦伟,杨启良,杨波,等. 一种安全性增强的Tor匿名通信系统[J]. 计算机研究与发展,2014,51(7):1538-1546.
ZHOU Y W,YANG Q L,YANG B,et al. A Tor anonymous communication system with security enhancements [J]. Journal of computer research and development,2014,51(7):1538-1546.(in Chinese)
[8]刘鑫. 基于Tor网络的匿名通信研究[D]. 上海:华东师范大学,2011.
LIU X. Research on anonymous communication based on Tor network[D]. Shanghai: East China Normal University,2011.(in Chinese)
[9]赵福祥,王育民,王常杰. 可靠洋葱路由的设计与实现[J]. 计算机学报,2001,24(5):463-467.
ZHAO F X,WANG Y M,WANG C J. An authenticated scheme of onion routing[J]. Chinese journal of computer,2001,24(5):463-467.(in Chinese)
[10]王伟平,陈建二,王建新,等. 基于组群的有限路长匿名通信协议[J]. 计算机研究与发展,2003,40(4):609-614.
WANG W P,CHEN J E,WANG J X,et al. An anonymous communication protocol based on groups with definite route length[J]. Journal of computer research and development,2003,40(4): 609-614.(in Chinese)
[11]王伟平,陈建二,陈松乔,等.匿名通信中短距离优先分组重路由方法的研究[J]. 软件学报,2004,15(4):561-570.
WANG W P,CHEN J E,CHEN S Q,et al. Research on a short distance-prior rerouting scheme in anonymous communication[J]. Journal of software,2004,15(4):561-570.(in Chinese)
[12]李金栓. 基于I2P的匿名通信协议分析与流量检测的研究[D]. 成都:电子科技大学,2015.
LI J S. Research on the analysis of I2P anonymous communication protocol and flow identification[J]. Chengdu: University of Electronic Science and Technology of China,2015.(in Chinese)
[13]CONTI M,CRANE S,FRASSETTO T,et al. Selfrando:securing the Tor browser against de-anonymization exploits[J]. Proceedings on privacy enhancing technologies,2016(4):454-459.
[14]廖小平. 对前向安全代理盲签名方案的分析与改进[J]. 计算机系统应用,2018,27(3):217-220.
LIAO X P. Analysis and improvement of forward secure proxy blind signature scheme[J]. Computer systems and applications,2018,27(3):217-220.(in Chinese)
[15]ANON. Forward security[EB/OL].(2018-05-25). https://zh.wikipedia.org/wiki/Forward security.
[16]JUAN P T,THIBAULT C,ISABELLE C,et al. Evaluation of the anonymous I2P network’s design choices against performance and security[C]//ICISSP 2015—Proceedings of the 1st International Conference on Information Systems Security and Privacy. Angers,France,2015.

Memo

Memo:
-
Last Update: 2018-09-30