Computer Science ›› 2019, Vol. 46 ›› Issue (4): 164-171.doi: 10.11896/j.issn.1002-137X.2019.04.026

• Information Security • Previous Articles     Next Articles

Bidirectional Anonymous Secret Communication Protocol Based on Onion Routing

ZHAO Meng-yao, LI Xiao-yu   

  1. School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China
  • Received:2018-02-09 Online:2019-04-15 Published:2019-04-23

Abstract: In the network,the identity of communicators is an important privacy.Anonymous communications can hide the sender and the recipient.Most of the research on anonymous communication is about the sender’s anonymity.There is less research on the receiver’s anonymity and bidirectional anonymity.In onion routing system,onion path is constructed by using source routing protocol and layer by layer encryption.The message is forwarded through orderly transit nodes according to onion path,which hides the sender’s address,realizes the sender’s anonymity and effectively prevents eavesdropping and traffic analysis.A new bidirectional anonymous secret communication protocol was proposed based on onion routing in this paper.The onion path constructed by the sender contains all the nodes in the system.Every hopping transfer node must judge whether the node is the receiver or not.If not,the message continues to be forwarded,and else,the recipient receives the message and the forwarding terminates.The identity of the sender(receiver) is not captured by the other party or any other user.Besides both sides of the communication,any transit node or intrudercan’t get the message.Therefore,the protocol achieves a two-way anonymous secret communication well.The anonymity of the receiver is realized without multicast,which effectively reduces the traffic in the system.The protocol is only based on onion routing anonymity system and is relatively simple.The experimental results show that with the increase of system users,the average response time and the average bidirectional communication time increase almost linearly,which indicates that the system is still stable and robust in the case of a large number of users.

Key words: Bidirectional anonymity secret communication, Network security, Onion routing, RSA public key system

CLC Number: 

  • TP319
[1]CHAUM D.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-88.
[2]REED M G,SYVERSON P F,GOLDSCHLAG D M,et al. Anonymous connections and onion routing[J].IEEE Journal on Selected Areas in Communications,1998,16(4):482-494.
[3]DINGLEDINE R,MATHEWSON N,SYVERSON P.Tor:The second-generation onion router[C]∥Proceedings of the 13th USENIX Security Symposium.San Diego,USA,2004.
[4]WU Q Z,XIE S X,JIA Y L.An improved Tor anonymous communication system[J].Science and Technology Information,2012(19):125-126.(in Chinese) 吴庆震,谢圣献,贾仰理.Tor系统的改进方案[J].科技信息,2012(19):125-126.
[5]HUO C Y,WU Z Q.Study and design of bidirectional anonymi- ty communication protocol[J].Computer Engineering,2008,34(19):174-178.(in Chinese) 霍成义,吴振强.双向匿名通信协议的研究与设计[J].计算机工程,2008,34(19):174-178.
[6]ZHENG G,XUE Z.A mixed anonymous system based on Tor[J].Information Security and Communications Privacy,2011(12):76-80.(in Chinese) 郑光,薛质.基于Tor的混合匿名转发系统[J].信息安全与通信保密,2011(12):76-80.
[7]ZHU Y,FU X W,GRAHAM B,et al.On flow correlation attacks and Countermeasures in mix networks[C]∥Proceedings of the 4th Privacy Enhancing Technology Workshop.Toronto,CANADA,2005:207-225.
[8]ZHAO F X,WANG Y M,WANG C J.An authenticated scheme of onion routing[J].Chinese Journal of Computers,2001,24(5):463-467.(in Chinese) 赵福祥,王育民,王常杰.可靠洋葱路由方案的设计与实现[J].计算机学报,2001,24(5):463-467.
[9]HE G F,YANG M,LUO J Z,et al.Modeling and analysis of time characteristics used in onion routing traceback techniques[J].Chinese Journal of Computers,2014,37(2):356-372.(in Chinese) 何高峰,杨明,罗军舟,等.洋葱路由追踪技术中时间特征的建模与分析[J].计算机学报,2014,37(2):356-372.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[3] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[4] DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108.
[5] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[6] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[7] ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351.
[8] CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497.
[9] WANG Jin-heng, SHAN Zhi-long, TAN Han-song, WANG Yu-lin. Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network [J]. Computer Science, 2021, 48(6): 338-342.
[10] ZHANG Kai, LIU Jing-ju. Attack Path Analysis Method Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(5): 294-300.
[11] LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332.
[12] JIANG Jian-feng, SUN Jin-xia, YOU Lan-tao. Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network [J]. Computer Science, 2021, 48(11A): 452-455.
[13] WANG Yu-chen, QI Wen-hui, XU Li-zhen. Security Cooperation of UAV Swarm Based on Blockchain [J]. Computer Science, 2021, 48(11A): 528-532.
[14] MA Lin, WANG Yun-xiao, ZHAO Li-na, HAN Xing-wang, NI Jin-chao, ZHANG Jie. Network Intrusion Detection System Based on Multi-model Ensemble [J]. Computer Science, 2021, 48(11A): 592-596.
[15] BAI Xue, Nurbol and WANG Ya-dong. Map Analysis for Research Status and Development Trend on Network Security Situational Awareness [J]. Computer Science, 2020, 47(6A): 340-343.
Full text



No Suggested Reading articles found!