Anonymous connection method of broadband radio IP network

An IP network and broadband wireless technology, applied in the field of communication security, can solve problems such as poor scalability, poor robustness, and low protocol efficiency, and achieve the effect of improving utilization

Inactive Publication Date: 2005-01-12
XIDIAN UNIV
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Poor versatility. The onion routing technology achieves the anonymous effect through layer-by-layer encapsulation on the transport layer. This technology is applicable to a dedicated onion routing network and can only be realized through a dedicated onion router;
[0006] (2) low efficiency, because the onion routing technology adopts layer-by-layer encapsulation method, when there are more than 10 onion routers in the middle, the protocol efficiency of the system is lower than 30%;
[0007] (3) The robustness is poor. Since the onion routing system adopts the connection-oriented virtual circuit method between the sending and receiving parties, and adopts strict source routing method for encapsulation, once a fault occurs anywhere in the virtual circuit, it will have an impact on the anonymous system. serious consequence;
[0008] (4) Poor scalability. The onion routing technology adopts a centralized encapsulation form. Before conducting anonymous communication, the onion router agent needs to negotiate keys with all selected onion routers. From the perspective of negotiation process and key management, this Centralized management is difficult to adapt to large-scale systems
However, most of the current wireless network access technologies do not consider the anonymity of the system. It is especially obvious that the content of both parties in the system can be easily obtained through the Internet. Even if encryption is used, it can still be obtained through Perform traffic analysis on the network to obtain information about who is communicating with whom in the system, what is the amount of communication, and how often is the communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous connection method of broadband radio IP network
  • Anonymous connection method of broadband radio IP network
  • Anonymous connection method of broadband radio IP network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The BWIP network anonymous system uses the distributed system idea, combined with the actual situation of the BWIP network, to change the global connection mode of the anonymous communication system into a segmented local connection, so that the BWIP network anonymous system not only improves the anti-traffic analysis, but also has the versatility powerful. In order to illustrate the BWIP network anonymity technical solution proposed in this patent, the present invention proposes an anonymous network system model existing in a safe key application and key management environment, combined below figure 1 Analyze and illustrate the implementation of anonymous technology for mobile users to browse Web servers anonymously.

[0059] figure 1 It is a BWIP network anonymous model, in which Alice, Tom and Bob (three names) represent mobile users MN, S1 and S2 represent anonymous servers that provide various services on the Internet, such as S1 is a Web server, S2 is an FTP serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

When mobile user logs on network to access host server, foreign agent FA and host agent HA are as network intermediate agent. Anonymity encapsulation method includes following step: selecting anonymous route in network layer, building anonymous connection, carrying out data encapsulation, as well as combination of polygenous network nested anonymous encapsulation and link encryption at intermediate router. Following measures are taken I the invention: encapsulating data packet transmitted, sharing anonymous channel, anonymous connection of distributed type route and anonymous encapsulation etc. The invention optimizes system capability of resisting interior attack to router and exterior attack to physical chain. Advantages are: favorable anonymity, transparency, expansibility and robustness.

Description

technical field [0001] The patent of the present invention belongs to the technical field of communication security, specifically a broadband wireless IP (Broadband Wireless IP, referred to as BWIP) network anonymity technology, which is suitable for future broadband wireless mobile IP (Internet Protocol, Internet Protocol) security, and can provide future mobile E-commerce, mobile e-government, etc. provide better anonymity technical guarantee. Background technique [0002] As people pay more and more attention to security and privacy on the Internet, in order to protect the privacy of users, some applications such as electronic voting (E-Voting), electronic banking (E-Banking), electronic commerce (E-Commerce) etc. will anonymity as a measure. In the application of broadband wireless IP network, the new value-added service of mobile device positioning turns the secret of mobile user's location into public information, and the user's privacy is greatly challenged. At the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
Inventor 马建峰吴振强赖晓龙牛广平曹春杰张帆裴庆祺
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products