期刊文献+

基于同步卫星通信网络的弱安全网络编码 被引量:2

Weakly Secure Network Coding Based on Synchronous Satellite Communication Networks
下载PDF
导出
摘要 卫星通信能够克服地面组播通信中用户频繁变动带来的不足,但其使用无线传输媒介传递信息,会导致信息泄露。针对其星间链路上存在被窃听的威胁,构造了一种防窃听的弱安全网络编码方案。该方案中,利用阈值方案达到信源与信宿共享密钥的目的,数据传输过程中,信源首先对数据进行加密,然后再利用网络编码技术对信息进行编码并传输。由于窃听者不知道加密矩阵,因此其无法得到关于信源任何有意义的信息。本方案能够防止窃听者窃听到星间链路上传输的信息,达到了弱安全的要求,同时利用网络编码技术,提高了网络容量的利用率。 Satellite communication can overcome the defect that users frequent changing brings about in multicast communication. But u- sing wireless transmission medium to transmit information causes it easy to be wiretapped and lead to information disclosure. For there ex- ist the threat of eavesdropping in the inter-satellite links,it constructed an anti-eavesdropping network coding scheme which can reach weak security. In the scheme,it uses the threshold scheme to achieve a key share between the source and the sinks before transmit the in- formation. When transmitting the information,the source encrypted the data then used network coding techniques to encode and transmit. This program can prevent eavesdroppers listening to the information from the inter-satellite links,reach weak security while improve net- work capacity utilization by using the network coding technology.
机构地区 西安通信学院
出处 《计算机技术与发展》 2012年第7期143-146,166,共5页 Computer Technology and Development
基金 全军军事学研究生课题(2010JY0419-239)
关键词 同步卫星 网络编码 门限方案 弱安全 satellite communication network coding threshold scheme weak security
  • 相关文献

参考文献5

二级参考文献80

  • 1孙岳,杨远,王新梅.基于网络编码的多播网络故障恢复[J].西安电子科技大学学报,2007,34(1):122-125. 被引量:4
  • 2Rouayheb S Y E, Soljanin E. On Wiretap Network II [C]//IEEE Intl Symp Inf Theory. Nice: IEEE Press, 2007: 551- 555.
  • 3Silva D, Kschischang F R. Security for Wiretap Networks Via Rank-Metric Codes [C]//IEEE Intl Symp Inf Theory. Toronto: IEEE Press, 2008.. 176-180.
  • 4Bhattad K, Narayanan K R. Weakly Secure Network Coding [EB/OL]. [2007-05-22]. http://netcod, org/papers/ 06Bhattad N-final. pdf.
  • 5Silva D, Kschischang F R. Universal Secure Network Coding Via Rank-Metric Codes [EB/OL]. [2008-11-10]. http:// arxiv, org/PS _ cache/arxiv/pdf/0809/0809. 3546vl. pdf.
  • 6Jain K. Security Based on Network Topology Against the Wiretapping Attack [J]. IEEE Wireless Communications, 2004, 11(1): 68-71.
  • 7Vileia J P, Lima L, Barros J. Lightweight Security for Network Coding [C]//Proc of the IEEE International Conference on Communications (ICC). Beijing: IEEE Press, 2008: 1750-1754.
  • 8Lima L, Medard M, Barros J. Random Linear Network Coding: a Free Cipher? [C]//IEEE Intl Symp Inf Theory. Nice: IEEE Press, 2007: 546-550.
  • 9Ahlswede R, Cai N, Li S-Y R, et al. Network Information Flow [J]. IEEE Trans on Inf Theory, 2000, 46(4):1204-1216.
  • 10Li S-Y R, Yeung R W, Cai N. Linear Network Coding [J]. IEEE Trans on Inf Theory, 2003, 49(2): 371-381.

共引文献29

同被引文献7

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部