期刊文献+

XSeluge:一个基于网络编码的安全在线代码分发算法

XSeluge:A Secure Online Code Dissemination Algorithm Based on Network Code
下载PDF
导出
摘要 针对现有安全在线代码分发算法的不足,本文提出了一个以Seluge为安全框架,结合了异或网络编码的安全在线代码分发算法XSeluge。基站首先对待分发的程序映像进行分页、分组以及用于验证的散列值计算和安置,然后通过一个数字签名发起真正的数据传输。为了最大化每次能被成功解码的数据分组的个数,XSeluge引入了一个邻居节点表来确定最优编码方案。节点接收到数据分组后解码,通过简单的散列计算和比较进行即时的数据分组验证。为了防止恶意节点,故意地反复请求数据分组或多次传送伪造的数据分组,XSeluge在扩充原邻居节点表结构的基础上引入了计数器机制。实验结果显示,XSeluge具有Seluge相似的安全性能,在减少数据分组的传输方面有更好的性能。 According to the drawbacks of the existing secure online code dissemination, a secure online code dissemination algorithm, called XSeluge, was proposed. XSeluge bases on XOR network code and employs the secure framework of Seluge. In XSeluge, the base station firstly divides the program image into a series of pages which are further divided into the packets with fixed-size and computes the hash value of each packet and places it in the proper position. Next, the base station begins the code dissemination with a digital signature. To maximize the number of packets which can be encoded successfully in a time slot, the node chooses the optimal code scheme by the neighbor node table introduced in this paper. Upon receiving the data packet, the node decodes and authenticates it by computing and comparing its hash value. To defense against the attacker where vicious nodes request continuously a data packet from some nodes and send continuously some forged data packet to some nodes, XSeluge expands the structure of original neighbor node table. Based on the new neighbor node table, a receiving counter and sending counter are introduced. The experiment results show XSeluge has similar secure performance with Seluge. Furthermore, XSeluge can reduce total the transmitted data packet during the code dissemination.
出处 《电信科学》 北大核心 2012年第11期74-80,共7页 Telecommunications Science
基金 浙江省科技厅重点创新团队基金资助项目(No.2010R50041) 浙江省科技厅重大优先主题项目(No.2011C14024) 浙江省教育厅重点项目(No.Z201122764)
关键词 网络编码 在线代码分发 散列函数 数字签名 network code, online code dissemination, hash function, digital signature
  • 相关文献

参考文献14

  • 1Hui J W, Culler D. The dynamic behavior of a datadissemination protocol for network programming at scale.Proceedings of the 2nd International Conference on EmbeddedNetworked Sensor Systems (SenSys *04), Baltimore, MD,UnitedStates, November 2004:81 -94.
  • 2Lanigan P E, Gandhi R, Narasimhan P. Sluice: securedissemination of code updates in sensor networks. IEEEInternational Conference on Distributed Computing SystemsPCDCS’06),Lisbon,Portu2gal, July 2006.
  • 3Dutta P K, Hui J W, Chu D C, et al. Securing the delugenetwork programming system. Proceedings of the 5 th InternationalConference on Information Processing in Sensor Networks(IPSN'06), Nashville, TN, United States, April 2006:326-333.
  • 4Deng J, Han R, Mishra S. Secure code distribution indynamically programmable wireless sensor networks. ACM/ IEEEConference on Information Processing in Sensor Networks,Nashville, TN, April 2006:292-300.
  • 5Park K, Lee J H, Kwon T Y, et al. Secure dynamic networkreprogramming using supplementary hash in wireless sensornetworks. Proceedings of Ubiquitous Intelligence and Computing-4th International Conference (UIC ’ 07), 2007: 653 ~ 662.
  • 6Shaheen J, Ostry D, Sivaraman V,et al. Confidential and securebroadcast in wireless sensor networks. Proceedings of IEEE 18thInternational Symposium on Personal, Indoor and Mobile RadioCommunications(PIMRC’07),Hong Kong, July 2007: 653-662.
  • 7Dong Q, Liu D G, Ning P. Pre-authentication filters: providingDoS-resistance for signature-based broadcast authentication insensor networks. Proceedings of the First ACM Conference onWireless Network Security (WiSec,08),New York, NY, USA,March 2008:2^13.
  • 8Tan H L ,Ostry D, Zic J, et al. A confidential and DoS-resistantmulti-hop code dissemination protocol for wireless sensor networks.Proceedings of the 2nd ACM Conference on Wireless NetworkSecurity(WiSec * 09), Zurich, Switzerland, March 2009:245-252.
  • 9Hyun S W, Ning P, Liu A, et al. Du. Seluge: secure and DoS-resistant code dissemination in wireless sensor networks.Proceedings of the 5th International Conference on InformationProcessing in Sensor Networks (IPSN’08), St Louis, MO, UnitedStates, April 2008:445-456.
  • 10Ning P, Liu A, Du W L. Mitigating DoS attacks againstbroadcast authentication in wireless sensor networks. ACM TransSen Netw, 2008, 4(1):1 -35.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部