[1]解雪妮,戴航,罗怡,等. 面向XMPP的端到端安全通信研究[J].计算机技术与发展,2015,25(07):116-119.
 XIE Xue-ni,DAI Hang,LUO Yi,et al. Research on End-to-end Secure Comunication for XMPP[J].,2015,25(07):116-119.
点击复制

 面向XMPP的端到端安全通信研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年07期
页码:
116-119
栏目:
安全与防范
出版日期:
2015-07-10

文章信息/Info

Title:
 Research on End-to-end Secure Comunication for XMPP
文章编号:
1673-629X(2015)07-0116-04
作者:
 解雪妮戴航罗怡张慧翔
 西北工业大学 自动化学院
Author(s):
 XIE Xue-ni DAI Hang LUO Yi ZHANG Hui-xiang
关键词:
 即时通信可扩展消息和出席协议端到端安全OpenSSL
Keywords:
 instant messagingXMPPend-to-end securityOpenSSL
分类号:
TP309
文献标志码:
A
摘要:
 随着即时通信系统应用的日益广泛,其安全性也成为关注的焦点。 XMPP协议的出现解决了即时通信系统的兼容问题,但伴随更多功能扩展而来的是安全问题。文中首先分析了XMPP协议现有的安全机制tLS和SASL协议,给出了其安全机制存在的问题。然后通过对端到端加密和签名协议的研究,给出了IM客户端端到端加密和签名的具体方案,并对加密系统和安全参数进行了性能测试。通过实验分析可知,采用不同的加密系统和安全参数,系统运行的时间效率不同,从而可以使用户在自身需求、操作效率和安全性之间获得最佳平衡。
Abstract:
 With the increasingly widespread of instant messaging system application,its security has become the focus of attention. XMPP protocol solves the instant communication system compatibility,but with more functions extension comes the security issues. In this paper, first analyze TLS protocol and SASL protocol,the existing security mechanism of XMPP,then point out the problems of them,on this basis,give the proposal of end-to-end encryption and signature for IM Client through the study of the end-to-end encryption and signature protocol,also test the performance of the encryption system and security parameters. Through the experiments,find that using different kinds of encryption system and security parameters,the effiency of the system is different,so users can achieve the optimal trade-off between the requirements of themselves,the effiency of the operation and system security.

相似文献/References:

[1]杨晓军 尚振宏 郭琳.全分布式P2P即时通信[J].计算机技术与发展,2008,(03):96.
 YANG Xiao-jun,SHANG Zhen-hong,GUO Lin.P2P Instant Message Based on Decentralized Structured Model[J].,2008,(07):96.
[2]王凯,吴君钦.基于DPI技术的IM协议识别系统研究[J].计算机技术与发展,2013,(11):120.
 WANG Kai,WU Jun-qin.Research on IM Protocol Recognition System Based on DPI Technology[J].,2013,(07):120.
[3]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(07):1.
[4]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(07):5.
[5]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(07):13.
[6]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(07):21.
[7]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(07):25.
[8]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(07):29.
[9]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(07):34.
[10]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(07):38.

更新日期/Last Update: 2015-09-07