期刊文献+

全局编码核加密的弱安全网络编码模型 被引量:2

Weakly Secure Network Coding Model Based on Global Encoding Kernel Encryption
下载PDF
导出
摘要 针对无线传感器网络(WSN)应用上人们关注的弱安全网络编码在窃听集合方面的限制问题,采用神经网络与混沌加密相结合的方法,设计了一种全局编码核加密的弱安全网络编码模型。该模型通过对全局编码核的保密传输,可以在整个网络都被窃听的情况下使通信安全能得到保障,且通过计算验证,其能耗没有明显增加,能以较小的代价实现对搭线窃听攻击的有效防护。 The limitation of weakly security network coding against eavesdrop group is paid attention for its appli- cations in Wireless Sensor Networks (WSNs). According to the encoding matrix's principle, a weakly secure net- work coding model based on global encoding kernel encryption is designed through using neural network integrat- ed with chaos-based encryption technology. By security transmission the global encoding kernel, secure commu- nication is possible in a environment where all the channels are eavesdropped in a communication network. Data simulation shows that the model has a little increase in energy consumption and it has a sharp improvement on protecting weakly security network against eavesdropping with a small cost on the energy consumption.
出处 《电讯技术》 北大核心 2012年第12期1974-1979,共6页 Telecommunication Engineering
基金 国家自然科学基金资助项目(60962002) 广西高校人才小高地建设创新团队资助计划项目(桂教人[2007]71号)~~
关键词 无线传感器网络 全局编码核加密 混沌加密 弱安全 搭线窃听 密钥更新 WSN global encoding kernel encryption chaos-based encryption weak security wiretapping rekeying
  • 相关文献

参考文献19

  • 1Ahlswede R, Cai N, Li R, et al. Network Information Flow [J]. IEEE Transactions on Information Theory,2000,46(4) : 1204- 1216.
  • 2Li S Y, Yeung R W, Cai N. Linear network coding[J]. IEEE Transactions on Information Theory,2003,49(2) :371 - 381.
  • 3Cai N, Yeung R W. Secure network coding[ C ]//Proceedings of 2002 IEEE International Symposium on Information Theory. Lausanne, Switzerland: IEEE, 2002: 323.
  • 4Cai N, Yeung R W. A security condition for multi-source linear network coding[C]//Proceedio.gs of 2007 IEEE International Symposium on Information Theory. Los Alamitis, CA, USA: IEEE, 2007 : 561 - 565.
  • 5Jain K. Security based on network topology against the wiretapping attack[J]. IEEE Wireless Communications, 2004,11 (1) :68 - 71.
  • 6Bhattad K, Narayanan K R. Weakly secure network coding [ C ]//Proceedings of First Workshop on Network Coding, Theory, and Applications. Riva del Garda, Italy: IEEE, 2005 : 1 - 5.
  • 7Lima L, Medard M, Barros J. Random linear network coding: A free cypher? [C]// Proceedings of 2007 IEEE International Symposium on Information Theory. Washington, DC: IEEE,2007:546 - 550.
  • 8谢成山,徐济仁,牛纪海.计算机网络安全技术初探[J].电讯技术,2001,41(6):99-101. 被引量:3
  • 9雷璟,王冬海.网络信息安全综合测试与仿真验证技术[J].电讯技术,2010,50(5):99-103. 被引量:1
  • 10Feldman J, Malkin T,Stein C, et al. On the capacity of secure network coding[ C]//Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing. Monticello, IL, USA: IEEE, 2004.

二级参考文献54

共引文献24

同被引文献18

  • 1Federal Communication Commission. Spectrum PolicyTask Force Report[R] / / ET Docket no. 02-155. Wash-ington,DC:FCC,2002.
  • 2Mitola J,Maguire G Q. Cognitive radio:making softwareradios more personal [J]. IEEE Personal Communica-tions,1999,6(4):13-18.
  • 3Khan F,Nakagawa K. Comparative study of spectrum sens-ing techniques in cognitive radio networks[C] / / Proceed-ings of 2013 World Congress on Computer and InformationTechnology(WCCIT). Sousse:IEEE,2013:1-8.
  • 4Digham F F,Alouini M S,Simon M K. On the Energy Detec-tion of Unknown Signals Over Fading Channels[J]. IEEETransactions on Communications,2007,55(1):21-24.
  • 5Gardner W A. Exploitation of spectral redundancy in cy-clostationary signals[J]. IEEE Signal Processing Maga-zine,1991,8(2):14-36.
  • 6Cabric D,Mishra S M,Brodersen R W. Implementationissues in spectrum sensing for cognitive radios[C] / / Pro-ceedings of the Thirty - Eighth Asilomar Conference onSignals, Systems and Computers. Pacific Grove, CA:IEEE,2004:772-776.
  • 7Lai L F,Fan Y J,Poor H V. Quickest Detection in Cogni-tive Radio: A Sequential Change Detection Framework[C] / / Proceedings of 2008 Global TelecommunicationsConference. New Orleans,LO:IEEE,2008:1-5.
  • 8Hanafi E,Martin P A,Smith P J,et al. Extension of Quic-kest Spectrum Sensing to Multiple Antennas and RayleighChannels[J]. IEEE Communications Letters,2013,17(4):625-628.
  • 9Hanafi E,Martin P A,Smith P J,et al. Performance ofquickest spectrum sensing over various fading channels[C] / / Proceedings of 2013 Communications TheoryWorkshop(AusCTW). Adelaide,SA:IEEE,2013:69-74.
  • 10Fanous A,Sagduyu Y E,Ephremides A. Reliable Spec-trum Sensing and Opportunistic Access in Network-Co-ded Communications[J]. IEEE Journal on Selected Are-as in Communications,2014,32(3):400-410.

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部