北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2010, Vol. 33 ›› Issue (2): 126-129.doi: 10.13190/jbupt.201002.126.266

• 研究报告 • 上一篇    下一篇

匿名通信系统集中式资源分发模型及其分析

曹首峰1,2,3, 李忠献1,3, 张振涛1,3, 杨义先1,2   

  1. (1北京邮电大学 网络与交换技术国家重点实验室, 北京 100876;
    2北京邮电大学 网络与信息攻防技术教育部重点实验室, 北京 100876;
    3天津市国瑞数码安全系统有限公司 北京研发中心, 北京 100088)
  • 收稿日期:2009-04-22 修回日期:2009-11-30 出版日期:2010-04-28 发布日期:2010-04-28
  • 通讯作者: 曹首峰
  • 作者简介:曹首峰(1980—), 男, 博士生, Email: caoshoufeng@gmail.com; 杨义先(1961—), 男, 教授, 博士生导师.
  • 基金资助:

    国家高技术研究发展计划项目(2007AA01Z430); 国家自然科学基金项目(60821001); 高等学校学科创新引智计划项目(B08004); 国家重点基础研究发展计划项目(2007CB311100)

A Central Resource Distribution Model and the Analysis in Anonymous Communication System

CAO Shou-feng1,2,3, LI Zhong-xian1,3, ZHANG Zhen-tao1,3, YANG Yi-xian1,2   

  1. (1State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China; 2Key Laboratory of Network and Information Attack and Defence Technology, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China; 3Tianjin National Cybernet Security Limited, Beijing Research and Development Center, Beijing 100088, China)
  • Received:2009-04-22 Revised:2009-11-30 Online:2010-04-28 Published:2010-04-28

摘要:

研究了匿名通信系统抗封锁技术,针对接入节点分发的问题提出一种集中式资源分发的通用模型. 在此模型基础上,通过理论计算和实验仿真对典型情况下采用随机策略的资源分发模型进行了抗攻击性分析,该模型可用来评估采用随机策略进行资源分发的匿名通信系统抗封锁设计的抗攻击能力,以及攻击者需要投入多少资源进行对抗. 分析结果表明,实际应用中抗封锁系统可以选取合适的每个用户接入节点分发数和建设大量接入节点来改善对抗能力,而对于攻击者可根据接入节点数进行适当的资源投入来对抗.

关键词: 匿名通信, 抗封锁, 抗网络审查, 资源分发

Abstract:

A general model of central resource distribution is proposed by studying the designs of blockingresistant anonymity system and considering the problem of access point information distribution. Based on this model, analysis of its specialized model with randomchoice strategy is given, which could be used for evaluating the antiattack ability of such systems and how much it costs to counter for the attacker. Simulation shows that the practical blockingresistant systems could select the appropriate amount of access points for each user and have a large number of active access points to improve the ability, and the censor could make appropriate investment according to the amount of access points to counter.

Key words: anonymous communication, blocking resistance, censorship resistant, resource distribution

中图分类号: