[1]李凌燕,魏庆征,杨 云,等.匿名网络I2P的安全性分析[J].南京师范大学学报(工程技术版),2018,18(03):010.[doi:10.3969/j.issn.1672-1292.2018.03.002]
 Li Lingyan,Wei Qingzheng,Yang Yun,et al.Security Analysis of Anonymous Network I2P[J].Journal of Nanjing Normal University(Engineering and Technology),2018,18(03):010.[doi:10.3969/j.issn.1672-1292.2018.03.002]
点击复制

匿名网络I2P的安全性分析
分享到:

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

卷:
18卷
期数:
2018年03期
页码:
010
栏目:
人工智能算法与应用专栏
出版日期:
2018-09-30

文章信息/Info

Title:
Security Analysis of Anonymous Network I2P
文章编号:
1672-1292(2018)03-0010-09
作者:
李凌燕魏庆征杨 云史庭俊贺兴亚
扬州大学信息工程学院,江苏 扬州 225127
Author(s):
Li LingyanWei QingzhengYang YunShi TingjunHe Xingya
College of Information Engineering,Yangzhou University,Yangzhou 225127,China
关键词:
匿名网络I2PKad算法安全性
Keywords:
anonymous network I2PKad algorithmsecurity
分类号:
TP393
DOI:
10.3969/j.issn.1672-1292.2018.03.002
文献标志码:
A
摘要:
I2P(invisible Internet project)是当前应用最广泛的匿名网络之一,采用大蒜路由的方式隐藏通信双方的通信关系,使用强加密协议和构建网络层的方法隐藏用户身份,并提供隐藏服务,进而达到全匿名的目的. 但其也存在许多安全问题. 通过对I2P网络的系统结构、工作原理、大蒜路由技术等方面的分析,指出了I2P存在的问题,并给出解决思路和技术构想.
Abstract:
I2P(invisible Internet project)is one of the most widely used anonymous networks. It uses garlic routing to hide the relationship between both sides of communication. It uses a strong encryption protocol and a network layer to hide the user identity and provide hidden services,thus acheiving the purpose of full anonymity. But it also has many security issues. Through the analysis of the system structure,working principle and garlic routing technology of I2P network,the problems of I2P are pointed out,and the solution ideas and technical ideas are given.

参考文献/References:

[1] 高俊杰. I2P匿名通信系统优化与实现[D]. 北京:北京大学,2014.
GAO J J. The optimization and implementation of I2P anonymous communication system [D]. Beijing:Peking University,2014.(in Chinese)
[2]ANON. I2P[EB/OL].(2018-07-02). https://zh.wikipedia.org/zh-hans/I2P.
[3]周勇. 基于Tor的匿名通信研究[D]. 西安:西安电子科技大学,2013.
ZHOU Y. Research on anonymous communication based on TOR[D]. Xi’an: Xidian University,2013.(in Chinese)
[4]DAVID C. Mix-Net[EB/OL].(2018-07-03). https://en.wikipedia.org/wiki/Mix_network.
[5]黄文杰. 基于Tor网络的随机均匀分布路由算法[D]. 上海:上海交通大学,2012.
HUANG W J. Uniform distribution routing algorithm based on Tor network[D]. Shanghai:Shanghai Jiao Tong University,2012.(in Chinese)
[6]ANON. Tor[EB/OL].(2018-06-28)https://zh.wikipedia.org/zh-hans/Tor.
[7]周彦伟,杨启良,杨波,等. 一种安全性增强的Tor匿名通信系统[J]. 计算机研究与发展,2014,51(7):1538-1546.
ZHOU Y W,YANG Q L,YANG B,et al. A Tor anonymous communication system with security enhancements [J]. Journal of computer research and development,2014,51(7):1538-1546.(in Chinese)
[8]刘鑫. 基于Tor网络的匿名通信研究[D]. 上海:华东师范大学,2011.
LIU X. Research on anonymous communication based on Tor network[D]. Shanghai: East China Normal University,2011.(in Chinese)
[9]赵福祥,王育民,王常杰. 可靠洋葱路由的设计与实现[J]. 计算机学报,2001,24(5):463-467.
ZHAO F X,WANG Y M,WANG C J. An authenticated scheme of onion routing[J]. Chinese journal of computer,2001,24(5):463-467.(in Chinese)
[10]王伟平,陈建二,王建新,等. 基于组群的有限路长匿名通信协议[J]. 计算机研究与发展,2003,40(4):609-614.
WANG W P,CHEN J E,WANG J X,et al. An anonymous communication protocol based on groups with definite route length[J]. Journal of computer research and development,2003,40(4): 609-614.(in Chinese)
[11]王伟平,陈建二,陈松乔,等.匿名通信中短距离优先分组重路由方法的研究[J]. 软件学报,2004,15(4):561-570.
WANG W P,CHEN J E,CHEN S Q,et al. Research on a short distance-prior rerouting scheme in anonymous communication[J]. Journal of software,2004,15(4):561-570.(in Chinese)
[12]李金栓. 基于I2P的匿名通信协议分析与流量检测的研究[D]. 成都:电子科技大学,2015.
LI J S. Research on the analysis of I2P anonymous communication protocol and flow identification[J]. Chengdu: University of Electronic Science and Technology of China,2015.(in Chinese)
[13]CONTI M,CRANE S,FRASSETTO T,et al. Selfrando:securing the Tor browser against de-anonymization exploits[J]. Proceedings on privacy enhancing technologies,2016(4):454-459.
[14]廖小平. 对前向安全代理盲签名方案的分析与改进[J]. 计算机系统应用,2018,27(3):217-220.
LIAO X P. Analysis and improvement of forward secure proxy blind signature scheme[J]. Computer systems and applications,2018,27(3):217-220.(in Chinese)
[15]ANON. Forward security[EB/OL].(2018-05-25). https://zh.wikipedia.org/wiki/Forward security.
[16]JUAN P T,THIBAULT C,ISABELLE C,et al. Evaluation of the anonymous I2P network’s design choices against performance and security[C]//ICISSP 2015—Proceedings of the 1st International Conference on Information Systems Security and Privacy. Angers,France,2015.

备注/Memo

备注/Memo:
收稿日期:2018-04-18.
基金项目:江苏省产学研前瞻性联合项目(BY2016069-16).
通讯联系人:杨云,博士,教授,研究方向:TCP/IP协议分析、匿名通信系统. E-mail:yyang@yzu.edu.cn
更新日期/Last Update: 2018-09-30