NDN is a kind of future Internet architecture. Due to the naming data network(NDN) design introduces four privacy challenges, Many research institutions began to care about the privacy issues of NDN. In this paper, this paper are in view of the major communication privacy issues of NDN to investigate privacy protection, then put forwards more effectively anonymous transfer policy for NDN. Firstly, using network coding anonymity technology of based on information segmentation, we propose network coding-based NDN anonymity communication protocol. Secondly, we add interest package authentication mechanism in the network coding of this protocol and encrypt the coding coefficient, security of this protocol is improved by this way. Finally, we proof the proposed anonymous transfer protocol security and anonymity.
The IntroductionFocus on the problems of the challenge of mobility and content distribution that the TCP/IP network architecture faces, academic proposes a new idea of resigning architecture, which is named data network (NDN).It is one of the most popular architecture in the future Internet architecture (FIA) [1].Security mechanism is added in the NDN design, but the researchers find that NDN design faces four privacy challenges: name privacy,content privacy, signature privacy, cache privacy [2].The solutions to the privacy challenges above are mostly for the information itself.For example,name privacy,some uses bloom filter [3] to improve the user's interest packet privacy; content privacy, Pailler homomorphism encryption system [4]or broadcast encryption mechanisms [5] is proposed to encrypt packet;signature privacy, research suggest to use the group signature, ring signature [6] and so on to solve the signature privacy. However, technology of these information encryption and signature cannot protect the communication relationship between the sender and the receiver.Therefore,in order to protect the communication relationship of sender and the receiver in NDN network,anonymity technology can be factored into an overall plan.TCP network anonymity scheme according to anonymity message forwarding way can be divided into three types: the first is based on the single message forwarding mode,such as based on anonymous communication path-Mix[7],Tor [8]; The second is based on replicated message-based. although they can provide a higher anonymity guarantee, they incur a huge traffic and waste the bandwidth; The third is based on the information splitting [9,10]. This way mainly adopts slicing a message into multiple pieces to implement the anonymity communication, but as long as the leaking node on each disjoint paths, attackers might get communication information. To solve the problems, some research consider using the network coding method to cope with the aforementioned problems. Later someone uses encoding confusion [11] to improve the ability against the attacks of the anonymous communication, but the application scope is small. Again, some suggest the anonymous communication based on the network coding and inf...