期刊文献+

一种抗拜占庭攻击的随机网络编码

A Random Network Coding Against Byzantine Attack
原文传递
导出
摘要 网络编码自提出以来得到了巨大的发展,并且在许多方面被广泛应用。网络安全是网络编码的重要的应用领域之一。安全网络编码最主要的两方面就是防窃听和防拜占庭攻击,实质上就是防搭线窃听与网络纠错。本文构造了一种基于范德蒙德行列式的随机网络编码,并通过添加Target位的方法来实现抗拜占庭攻击;对于同时具备窃听和修改能力的攻击者,设计了一种改进的借助数据位的Target位构造方法;针对攻击者可能仅修改部分数据的具体情况给出了一种变步进多Target位的解决方案,即通过构造步进函数的方式来选取多个数据,构造多个Target位来提高数据安全性,并且通过部分数据验证了其可行性。 Since network coding has been proposed,it has developed greatly, and has been widely applied.Security of network coding is an important application fields. Secure network coding has two major respects, anti-eavesdropping and anti-Byzantine attacks, essentially, is anti-wiretapping, and network error correction. In this paper, we based on Fandemengde determinant,propose a solution by constructing a Hash function and adding a target bit against Byzantine attack, and inhance the security by improve the target bit,and propose a solution of variable stepper and multiple target bit,by construct stepper function and build several target bits,against that the attacker may modify a little data bits, and prove with some experiment data.
作者 王丹 夏俊
出处 《网络安全技术与应用》 2013年第3期43-47,共5页 Network Security Technology & Application
关键词 随机网络编码 窃听 拜占庭攻击 random network coding eavesdropping adversaries byzantine
  • 相关文献

参考文献7

  • 1Rudolf Ahlswede, Ning Cai, Shuo-Yen Robert Li, eta 1. Network information flow[J]. IEEE Trans. Inform. Theory, 2000.
  • 2Ho Tracey, Medard Muriel, Koetter Rail'. An information- thoreic view of network management[J]. IEEE Transactions on Information Theory, April, 2005.
  • 3Ho T. keong B, Yu-Han Chang, et al. Network monitoring in multicast networks using network coding [C]. IEEE International Symposium on Information Theory (ISIT)(IEEE Cat.No. 05CH3768C).2005.
  • 4Wu Y, Chou P A, Zhang Q, et al. Network planning in wireless ad hoc networks: a cross-layer approach[J]. IEEEJ.Sel.Areas Commun.2005.
  • 5Yunnan Wu, Sun-yuan Kung. Reduced-complexity network coding for rnulticasting over ad hoc networks[C]. IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005. Proceedings. OCASSP'05). Volume 3, 18-23 March 2005.
  • 6Ho T C, Leong B, Koetter R, et al. Byzantine Modification Detection in Multicast Networks Using Randomized Network Coding[C]. IEEE lntl Symp lnf Theory. Chicago:EEE Press, 2004.
  • 7周业军,李晖,马建峰.一种防窃听的随机网络编码[J].西安电子科技大学学报,2009,36(4):696-701. 被引量:18

二级参考文献22

  • 1孙岳,杨远,王新梅.基于网络编码的多播网络故障恢复[J].西安电子科技大学学报,2007,34(1):122-125. 被引量:4
  • 2Rouayheb S Y E, Soljanin E. On Wiretap Network II [C]//IEEE Intl Symp Inf Theory. Nice: IEEE Press, 2007: 551- 555.
  • 3Silva D, Kschischang F R. Security for Wiretap Networks Via Rank-Metric Codes [C]//IEEE Intl Symp Inf Theory. Toronto: IEEE Press, 2008.. 176-180.
  • 4Bhattad K, Narayanan K R. Weakly Secure Network Coding [EB/OL]. [2007-05-22]. http://netcod, org/papers/ 06Bhattad N-final. pdf.
  • 5Silva D, Kschischang F R. Universal Secure Network Coding Via Rank-Metric Codes [EB/OL]. [2008-11-10]. http:// arxiv, org/PS _ cache/arxiv/pdf/0809/0809. 3546vl. pdf.
  • 6Jain K. Security Based on Network Topology Against the Wiretapping Attack [J]. IEEE Wireless Communications, 2004, 11(1): 68-71.
  • 7Vileia J P, Lima L, Barros J. Lightweight Security for Network Coding [C]//Proc of the IEEE International Conference on Communications (ICC). Beijing: IEEE Press, 2008: 1750-1754.
  • 8Lima L, Medard M, Barros J. Random Linear Network Coding: a Free Cipher? [C]//IEEE Intl Symp Inf Theory. Nice: IEEE Press, 2007: 546-550.
  • 9Ahlswede R, Cai N, Li S-Y R, et al. Network Information Flow [J]. IEEE Trans on Inf Theory, 2000, 46(4):1204-1216.
  • 10Li S-Y R, Yeung R W, Cai N. Linear Network Coding [J]. IEEE Trans on Inf Theory, 2003, 49(2): 371-381.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部