期刊文献+

一种在低带宽下的安全网络编码模型 被引量:1

Secure network coding model on low bandwidth network
下载PDF
导出
摘要 Feldman等人提出,网络编码满足安全性等价于找到满足一定广义矩阵的线性码。分析发现该模型存在一个严重的安全漏洞,即任意接收节点泄露了矩阵M给窃听者,该网络就失去了安全意义。针对模型的缺陷,提出了一种在低带宽下,对安全性要求高的安全网络编码模型。即结合一次一密,改变源输入信息的编码方式,用随机密钥k对原始信息进行加密,利用原来传输矩阵M的安全通道来传输随机密钥k的同时不必牺牲少量的整体容量。分析表明,该模型不仅能够抵抗节点的叛变攻击,内容保密性也得到了进一步提高,模型具有抵抗流量攻击能力,抵抗节点叛变攻击能力以及内容保密性较高等特点。 Feldman showed that the problem of making a linear network coding secure was equivalent to the problem of finding a linear code with certain generalized distance properties,while a security hole was detected in Feldman secure network coding model,if there was any receiving node which betrayed the secure matrix M,then this model would completely lose security meaning.Aimed the defect of this model,this paper presents a new secure network coding model which is suit to the network of high security and low bandwidth.This new model encrypts information with random k,by changing the coding method of information with one-time pad,at the same time the random k is transmitted through the secure channel of secure matrix M.Analysis shows that this new model not only can resist the nodes’traitorous attack,but also can improve content confidentiality.This new model has these characters: the ability to resist traffic analysis;the ability to resist the nodes’traitorous attack;stronger content confidentiality.
出处 《计算机工程与应用》 CSCD 2012年第11期93-96,101,共5页 Computer Engineering and Applications
基金 陕西省自然科学基金(No.S2009JC493)
关键词 安全网络编码 安全矩阵 一次一密 性能分析 secure network coding secure matrix one-time pad performance analysis
  • 相关文献

参考文献13

  • 1Ahlswede R,Cai N,Li S Y R,et al.Network information flow[J].IEEE Transactions on Information Theory,2000,46(4):1204-1216.
  • 2Li S Y R,Yeung R W,Cai N.Linear network coding[J].IEEE Transactions on Information Theory,2003,49(2):371-381.
  • 3Koetter R,Medard M.An algebraic approach to network coding[J].IEEE/ACM Transactions on Network,2003,11(5):782-795.
  • 4Jaggi S,Sandrs P,Chou P A,et al.Polynomial time algo-rithms for multicast network code construction[J].IEEE Transactions on Information Theory,2005,51(6):1973-1982.
  • 5Ho T,Koetter R,Medard M,et al.The benefits of cod-ing over routing in a randomized setting[C]//2003IEEE International Symposium on Information Theory(ISIT’03),Jun29-Jul4,2003,Yokohama,Japan,2003:442-445.
  • 6Cai N,Yeung R W.Secure network coding[C]//Proceed-ings of2002IEEE International Symposium on Infor-mation Theory(ISIT2002),Jun30-Jul5,2002,Laus-anne,Switzerland.Los Alamitos,CA,USA:IEEE Comput-er Society,2002.
  • 7Feldman J,Malkin T,Stein C,et al.On the capacity of secure network coding[C]//42nd Annual Allerton Confer-ence on Communication,Control,and Computing,Monti-cello,IL,Sept29-Oct1,2004.
  • 8Jain K.Security based on network topology against the wiretapping attack[J].IEEE Wireless Communications,2004,11(1):68-71.
  • 9Bhattad K,Narayanan K R.Weakly secure network cod-ing[C]//Proceedings of1st Workshop on Network Cod-ing,Theory,and Applications(NETCOD’05),Apr2005,Riva del Garda,Italy,2005.
  • 10Chan T,Grant A.Capacity bounds for secure network coding[C]//Proceedings of Australian Communications Theory Workshop(AusCTW2008),Jan30-Feb1,2008,Christchurch,New Zealand.Piscataway,NJ,USA:IEEE,2008:95-100.

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部