期刊文献+

安全的网络编码所面临的挑战和对策 被引量:3

Secure Network Coding:Challenges and Solution
下载PDF
导出
摘要 近年来,网络编码以其巧妙的思想展现出生机勃勃的应用前景,但是安全问题一直是其在网络中大规模应用的最大障碍。在现有研究成果上,从网络编码的基本原理出发,按照物理层和网络层两个层面对系统的各个部分进行了更加全方位的安全隐患分析;也给出了针对ACK类和编码类攻击的基于典型集和哈希函数以及马尔可夫模型的防御方法;同时提出了结合利用云计算和网络编码构建计算网络的概念;最后对网络编码的未来研究方向进行了展望。 In recent years,network coding has emerged some exciting future because of its smart technology.However,in order to let network coding become popular in the Internet,its security problem must be solved.Firstly,a wide range of attacks were revealed based on our systematic analysis of the components of these frameworks vulnerabilities.Secondly,this paper gave one proposal for ACK attacks and coding attacks based on Typical Set,Hash Functions and Markov model.Thirdly,one thinking named as Computing Network,which integrates Cloud Computing with Network Coding,was proposed.Finally,the open issues and challenges for network coding referring to both theory and application in near future were proposed.
出处 《计算机科学》 CSCD 北大核心 2011年第6期20-27,共8页 Computer Science
基金 国家自然科学基金-广东联合基金重点项目(U0735002) 国家自然科学基金(60970146)资助 国家"863"高技术研究发展计划基金项目(2007AA01Z449)
关键词 网络编码 网络安全 典型集 哈希函数 云计算 Network coding Network security Typical set Hash function Cloud computing
  • 相关文献

参考文献43

  • 1Ahlswede R, Cai N, Li S Y R, et al. Network information flow [J]. IEEE Trans on Information Theory, 2000, 46 (4): 1204- 1216.
  • 2Li S Y R, Yeung R W, Cai N. Linear network coding[J]. IEEE Trans on Information Theory, 2003,49 (2) : 371-381.
  • 3Zhang Sheng-li, Liew S C. Hot topic: physical- layer network coding [C]//Proceedings of the 12th annual international con- ference on Mobile computing and networking. Los Angeles, CA, USA,2006.
  • 4Katti S, Gollakota S,Katabi D. Embracing wireless interference: Analog network coding[C]//Proc. ACM SIGCOMM. Kyoto, Ja- pan, Aug. 2007 : 397-408.
  • 5Laneman J N, Tse D N C,Wornell G W. Cooperative diversity in wireless networks: Efficient protocols and outage behavior [J]. IEEE Trans. Inf. Theory, 2004,51 (12) : 3062-3080.
  • 6Lu Ke-jie, Fu Sheng-li, Qian Yi. On The Security Performance oI Physical-Layer Network Coding [C] // Proc. IEEE ICC 2008Beijing, China, May 2008.
  • 7Ho T, Lun D S. Network coding: an introduction [M]. Cam- bridge University Press, 2008 : 49-60.
  • 8Byers J W, Luby M. A digital fountain approach to reliable distri- bution of bulk data[C]//Proceedings of the ACM SIGOMM '98 conference on applications, technologies, architectures, and pro- tocols for computer communication. Vancouver, British Colum- bia, Canada, 1998 : 56-67.
  • 9Dong Jing,Curtmola R. Secure network coding for wireless mesh networks: Threats, challenges, and directions [J]. Computer Communications, 2009,323 ( 17 ) : 1790-1801.
  • 10Chachulski S,Jennings M, Katti S, et al. Trading structure for randomness in wireless opportunistic routing [C]//Proc. of ACM SIGCOMM'07. 2007.

二级参考文献27

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2ZHONG An-ming 1, JIA Chun-fu 1,21.College of Information Technology and Sciences, Nankai University, Tianjin 300071,China,2.State Key Laboratory of Information Security, Institute of Software of Chinese Academy of Science, Beijing 100039,China.Privilege Flow Oriented Intrusion Detection Based on Hidden Semi-MarkovModel[J].Wuhan University Journal of Natural Sciences,2005,10(1):137-141. 被引量:2
  • 3钟安鸣,贾春福.基于系统调用入侵检测的马氏链模型[J].计算机应用研究,2005,22(4):134-136. 被引量:3
  • 4.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 5Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 6Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 7Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 8International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 9Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 10Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743

共引文献258

同被引文献59

  • 1熊志强,黄佳庆,刘威,杨宗凯.无线网络编码综述[J].计算机科学,2007,34(3):6-9. 被引量:23
  • 2严鸣,汪卫,施伯乐.无线传感器网络中关键节点的节能问题[J].计算机应用与软件,2007,24(6):129-131. 被引量:6
  • 3AHLSWEDE R, CAI N, LI S Y R, et al. Network information flow[J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204-1216.
  • 4LI S Y R, YEUNG R W, CAIN. Linear network coding[J]. IEEE Transactions on Information Theory, 2003, 49(2): 371-381.
  • 5CHU X, JIANG Y. Random linear network coding for peer-to-peer applications[J]. Network, IEEE, 2010, 24(4): 35-39.
  • 6HO T, LUN D S. Network Coding: an Introduction[M]. Cambridge Univ Pr, 2008.
  • 7CHAPORKAR P, PROUTIERE A. Adaptive network coding and scheduling for maximizing throughput in wireless networks[A]. Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking[C]. Montreal,QC,Canada, 2007, 135-146.
  • 8KATTI S, RAHUL H, HU W, et al. XORs in the air: practical wireless network coding[J]. IEEE/ACM Transactions on Networking (TON), 2008, 16(3): 497-510.
  • 9LE J, LUI J, CHIU D M. DCAR: Distributed coding-aware routing in wireless networks[J]. IEEE Transactions on Mobile Computing, 2010, 9(4):596-608.
  • 10YOMO H, POPOVSKI P. Opportunistic scheduling for wireless network coding[A]. Proceedings of IEEE International Conference on Communications (ICC'07)[C]. Glasgow, Scotland, 2007. 5610-5615.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部