期刊文献+

基于网络编码的传感器网络防窃听技术 被引量:1

Network coding anti-eavesdropping system for wireless sensor networks
原文传递
导出
摘要 对基于网络编码的无线传感器网络防窃听技术,该文采用线性网络编码技术,建立了多条不相交多路径,通过源节点和中间节点对原始数据包和接收到的数据包进行编码,窃听节点只有在接收到处于不同链路上的足够数据包数才能够成功解码获得有价值的数据。通过理论分析研究了节点通信能力和网络覆盖率的关系。结果表明:窃听者通常只有大幅增加单个节点通信半径,或者采用多节点协同窃听方式,才能提高成功窃听的概率。 A network coding based anti-eavesdropping method was developed for wireless sensor networks.Linear network coding is used with multiple disjointed paths to the sink nodes with encoding of the original packets and re-encoding of received packets at the source node and intermediate nodes.The eavesdropper can recover the original packets only if it obtains enough encoded packets.Thus,the network privacy is enhanced.An analysis of the rate of coverage and the node transmission ability shows that the eavesdropper needs to enlarge its communication radius or cooperate with other eavesdroppers to increase its probability of successfully eavesdropping.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第10期1341-1344,共4页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(61001091 60873217)
关键词 网络编码 多径路由 防窃听 无线传感器网络 network coding multipath routing anti-eavesdrop wireless sensor network
  • 相关文献

参考文献9

  • 1Ahlswede R, Cai N. Network information flow [J]. Information Theory, 2000, 46(4): 1204 -1216.
  • 2Li S Y, Yeung R, Cai N. Linear network coding [J]. IEEE Transactions on Information Theory, 2003, 49(2): 371 -379.
  • 3Ho T, Medard M, Karger D R, et al. A random linear network coding approach to multieast [J]. IEEE Transactions on Information Theory, 2004, 52( 10) : 4413 -4430.
  • 4Yuwang Y, Chunshan Z, Yamin S, et al. Network coding based reliable disjoint and braided multipath routing for sensor networks [J]. Journal of Network and Computer Applications, 2010, 33(4): 422-432.
  • 5杨余旺,古力,鞠玉涛,郑亚,孙亚民,杨静宇.Reliable Braided Multipath Routing with Network Coding for Underwater Sensor Networks[J].China Ocean Engineering,2010,24(3):565-574. 被引量:5
  • 6Katti S, Rahul H, Hu W. Xorsin the air: Practical wireless network coding [J]. IEEE/ACM Transactions Netzoorking, 2008, 16(3):497-510.
  • 7Krohn M, Freedman M, Mazieres D. On the Fly verification of rateless erasure codes for efficient content distribution [C]// Proceedings of the 2004 IEEE Symposium on Security and Privacy. Berkeley, USA: IEEE Computer Society, 2004: 226 - 240.
  • 8Chou P A, WU Yunnan, Jain K. Practical network coding [C]// Proceedings of the 41st Annual Allerton Conference on Communication Control and Computing. Baltimore, Maryland: Institute of Electrical and Electronics Engineers,2003: 28-37.
  • 9Jaggi S, Sanders P, Chou P A, et al. Polynomial time algorithms for multicast network code construction [J].IEEE Transactions on Information Theory , 2005, 51(8): 1973 - 1982.

二级参考文献2

共引文献4

同被引文献13

  • 1罗明星,杨义先,王励成,钮心忻.抗窃听的安全网络编码[J].中国科学:信息科学,2010,40(2):371-380. 被引量:10
  • 2Ahlswede R, Cai Ning, Li S Y R, et al. Network information flow[J]. IEEE Transactions on Information Theory, 2000,46 (4) :1204-1216.
  • 3Li S Y R,Yeung R W, Cai Ning. Linear network coding [ J ]. IEEE Trans on Information Theory,2003 ,g9(2) :371-381.
  • 4Cai Ning, Yeung R W. Secure network coding [ C]//Proc of IEEE international symposium on information theory. [ s. 1. ] : IEEE ,2002.
  • 5Cai Ning, Yeung R W. Secure network coding on a wiretap network [ J]. IEEE Trans on Information Theory, 2011,57 ( 1 ) :424-435.
  • 6Cai Ning, Chan T. Theory of secure network coding [ J ]. Pro- ceedings of the IEEE ,2011,99 ( 3 ) :421-437.
  • 7Bhattad K,Naraynan K R. Weakly secure network coding[ C ] //Proc of' the 1 st workshop on network coding, theory, and ap- plications. [ s. 1. ] : [ s. n. ] ,2005.
  • 8Harada K, Yamamoto H. Strongly secure linear network coding [ J ]. IEICE Trans on Fundamentals of Electronics, Communi- cations and Computer Sciences, 2008, E91 -A ( 10 ) : 2720 - 2728.
  • 9周业军,李晖,马建峰.一种防窃听的随机网络编码[J].西安电子科技大学学报,2009,36(4):696-701. 被引量:18
  • 10俞立峰,杨琼,于娟,沈才樑.防窃听攻击的安全网络编码[J].计算机应用研究,2012,29(3):813-818. 被引量:10

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部