期刊文献+

基于信息论安全的防窃听网络编码方案 被引量:11

Network Coding Scheme Against Wiretapping Based on Information Theory Security
下载PDF
导出
摘要 为提高组播通信网络中信息传输的安全性,提出一种基于信息论安全的网络编码方案。利用大素数及其本原根产生不同的噪声符号,并将噪声符号与原始信息进行混合,达到隐藏信息的目的。分析结果表明,该方案通过舍弃少量带宽,使网络编码以很高的概率达到信息论安全的要求,当信源与信宿之间有一条专用的安全信道时,可在不增加通信开销的前提下使网络的信息论安全概率为1。 In order to improve the security of information transmitted in a multicast network, this paper proposes a network coding scheme based on information security. A large prime number and its primitive root produce different noise symbols, and the symbols are mixed with the original information to achieve the purpose in hiding information. Analysis results show that the scheme is able to make network coding a very high probability of information theory safety by swallowing a small amount of bandwidth. When a dedicated secure channel between the source and sink is usable, the secure channel algorithm can achieve the probability 1 of information theory security without increasing the overhead traffic.
出处 《计算机工程》 CAS CSCD 2012年第22期107-110,共4页 Computer Engineering
关键词 网络编码 信息论 大素数 本原根 最大流 network coding information theory big prime number primitive root maximum flow
  • 相关文献

参考文献12

  • 1Ahlswede R, Cai Ning, Li Shuo-Yen, et al. Network Information Flow[J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204-1216.
  • 2Li Shuo-Yen, Yeung R W, Cai Ning. Linear Network Coding[J]. IEEE Transactions on Information Theory, 2003, 49(2): 371-381.
  • 3Deb S, Ho E T. Network Coding for Wireless Applications: A Brief Tutorial[C]//Proceedings of International Workshop on Wireless Ad-hoc Networks. London, UK: [s. n.], 2005.
  • 4廖勇,杨士中.无线Mesh网络下的网络编码机制[J].北京邮电大学学报,2010,33(1):27-32. 被引量:3
  • 5Ho T, Leong B, Koetter R. Byzantine Modification Detection in Multicast Networks with Random Network Coding[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2798-2830.
  • 6牛淑芬,王彩芬.多源线性网络编码的同态签名算法[J].计算机工程,2012,38(2):126-128. 被引量:4
  • 7Cai Ning, Yeung R W. Secure Network Coding[C]//Proceedings of IEEE International Symposium on Information Theory. [S. 1.]: IEEE Press, 2002.
  • 8Zhang Yan, Xu Chengqi, Wang Feng. A Novel Scheme for Secure Network Coding Using One-time Pad[C]//Proceedings of Intemational Conference on Networks Security, Wireless Communications and Trusted Computing. [S. 1.]: IEEE Press, 2009 92-98.
  • 9Bhattad K, Narayana K R. Weakly Secure Network Coding[EB/OL]. (2007-05-22). http://netcod.org.papers/06Bhattad N-final.pdf.
  • 10Majid A, Huaping L. Secure Network Coding with Minimum Overhead Based on Hash Functions[J]. IEEE Communications Letters, 2009, 13(12): 956-958.

二级参考文献40

  • 1孙岳,杨远,王新梅.基于网络编码的多播网络故障恢复[J].西安电子科技大学学报,2007,34(1):122-125. 被引量:4
  • 2Rouayheb S Y E, Soljanin E. On Wiretap Network II [C]//IEEE Intl Symp Inf Theory. Nice: IEEE Press, 2007: 551- 555.
  • 3Silva D, Kschischang F R. Security for Wiretap Networks Via Rank-Metric Codes [C]//IEEE Intl Symp Inf Theory. Toronto: IEEE Press, 2008.. 176-180.
  • 4Bhattad K, Narayanan K R. Weakly Secure Network Coding [EB/OL]. [2007-05-22]. http://netcod, org/papers/ 06Bhattad N-final. pdf.
  • 5Silva D, Kschischang F R. Universal Secure Network Coding Via Rank-Metric Codes [EB/OL]. [2008-11-10]. http:// arxiv, org/PS _ cache/arxiv/pdf/0809/0809. 3546vl. pdf.
  • 6Jain K. Security Based on Network Topology Against the Wiretapping Attack [J]. IEEE Wireless Communications, 2004, 11(1): 68-71.
  • 7Vileia J P, Lima L, Barros J. Lightweight Security for Network Coding [C]//Proc of the IEEE International Conference on Communications (ICC). Beijing: IEEE Press, 2008: 1750-1754.
  • 8Lima L, Medard M, Barros J. Random Linear Network Coding: a Free Cipher? [C]//IEEE Intl Symp Inf Theory. Nice: IEEE Press, 2007: 546-550.
  • 9Ahlswede R, Cai N, Li S-Y R, et al. Network Information Flow [J]. IEEE Trans on Inf Theory, 2000, 46(4):1204-1216.
  • 10Li S-Y R, Yeung R W, Cai N. Linear Network Coding [J]. IEEE Trans on Inf Theory, 2003, 49(2): 371-381.

共引文献22

同被引文献43

  • 1罗明星,杨义先,王励成,钮心忻.抗窃听的安全网络编码[J].中国科学:信息科学,2010,40(2):371-380. 被引量:10
  • 2庄力可,寇忠宝,张长水.网络日志挖掘中基于时间间隔的会话切分[J].清华大学学报(自然科学版),2005,45(1):115-118. 被引量:24
  • 3AHLSWEDE R, CAI N, LI S Y R, ef o/. Network information flow[J]. IEEE Trans on Information Theory,2000,46(4) :1204-1216.
  • 4CAI N, YEUNG R W. Secure network coding[C]// Proc of IEEEInternational Symposium on Information Tlieory. [S. 1,] : IEEE Com-puter Society, 2002 :323-340.
  • 5FELDMAN J, MALKIN T, STEIN C,ei al. On the capacity of securenetwork coding [C] // Proc of the 42 nd Annual Allerton Conferenceon Communication,Control,and Computing. Monticello : Curran As-sociates ,2004 ;30-40.
  • 6KROHN M N,FREEDMAN M, MAZIERESJ D. On-the-fly verifica-tion of rateless erasure codes for efficient content distribution [C] //Proc of IEEE Symposium on Security and Privacy. [S. 1.] : IEEEComputer Society ,2004:226-240.
  • 7GKANTSIDIS C, RODRIGUEZ P. Cooperative security for networkcoding file distribution[C]//Proc of the 25th IEEE International Con-ference on Computer Communications. 2006:743-757.
  • 8张岩.一种改进的安全网络编码方案的研究[C]//中国电子学会第十五届信息论学术年会论文集.北京:国防工业出版社,2008:962-966.
  • 9Ahlswede R, Cai Ning, Li S Y R, et al. Network information flow[J]. IEEE Transactions on Information Theory, 2000,46 (4) :1204-1216.
  • 10Li S Y R,Yeung R W, Cai Ning. Linear network coding [ J ]. IEEE Trans on Information Theory,2003 ,g9(2) :371-381.

引证文献11

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部