期刊文献+

基于数字签名的防污染网络编码方案 被引量:4

Pollution-Resistant Network Coding Scheme Based on Digital Signature
下载PDF
导出
摘要 网络编码技术对于提高网络吞吐量、均衡网络负载、提高带宽利用率、增强网络的鲁棒性等方面都有明显的优势,但是无法直接抵抗污染攻击.最近,学者提出了基于同态哈希函数的签名方案,可以较好检测污染攻击,但是很难定位被污染的节点.本文结合两者的优势提出了一个基于数字签名的网络编码方案,该方案不仅能够抵抗污染攻击,而且能有效地确定出攻击源的位置,从而降低污染攻击对网络造成的影响,并提升网络的健壮性. Network coding technology has obvious advantages for improving networks throughput,balancing network load,improving bandwidth availability ratio, enhancing robustness of networks, but it can't resist against pollution attacks directly. Recently, scholars propose the signature scheme based on homomorphic Hash function, which could better detect pollution attacks, but it is difficult to locate the contaminated node. This paper proposes a network coding scheme based on the digital signature by combining with the advantages of both. It can not only resist pollution attack, but also can effectively identify position of attack source. Thus, it reduces the impact of pollution attacks to the network and enhances the robustness of the network.
作者 周赵斌 许力
出处 《计算机系统应用》 2016年第6期185-190,共6页 Computer Systems & Applications
基金 国家自然科学基金海峡联合基金(U1405255) 国家自然科学基金(61202450 61472083 61202452)
关键词 网络编码 污染攻击 身份确认 数字签名 同态哈希函数 network coding pollution attacks identification digital signature homomorphic hash function
  • 相关文献

参考文献14

  • 1Ahlswede R, Cai N, Li SYR, et al. Network information flow. IEEE Trans. on Information Theory, 2000, 46(4): 1204-1216.
  • 2Li SYR, Yeung RW, Cai N. Linear network coding. IEEE Trans. on Information Theory, 2003, 49(2): 371-381.
  • 3Ho T, Koetter R, Medard M, et al. The benefits of coding over routing in a randomized setting. Proc. of the IEEE International Symposium on Information Theory. 2003. 442.
  • 4Krohn MN, Freedman MJ, Mazieres D. On-the-fly verification of rateless erasure codes for efficient content distribution. Proc. IEEE Symposium on Security and Privacy, 2004. IEEE. 2004. 226-240.
  • 5Kehdi E, Li B. Null keys: Limiting malicious attacks via null space properties of network coding. Proc.of INFOCOM'09. IEEE Press. 2009.
  • 6Yu Z, Wei YW, Ramkumar B, et al. An efficient signature-based scheme for securing network coding against pollution attacks. Proc. of the 27th IEEE Conference on Computer Communications (INFOCOM). Phoenix, AZ, US. IEEE Press. April 13-18, 2008. 2008. 1409-1417.
  • 7Yu Z, Wei YW, Ramkumar B, et al. An efficient scheme for securing XOR network coding against pollution attacks. Proc. of IEEE INFOCOM. Rio de Janeiro, Brazil. IEEE Press. April 19-25, 2009. 2009. 406-414.
  • 8Yun A, Cheon JH, Kim Y. On homomorphic signatures for network coding. IEEE Trans. on Computers, 2010, 59(9): 1295-1296.
  • 9Zhang P, Jiang YX, Lin C, et al. Padding for orthogonality: Efficient subspace authentication for network coding. Proc. of IEEE INFOCOM. Shanghai, China. IEEE Press. April 10-15, 2011. 2011. 1026-1034.
  • 10Gkantsidis C, Rodriguez PR. Cooperative Security for Network Coding File Distribution. Proc. of the 25th IEEE International Conference on Computer Communications (INFOCOM). Barcelona, Spain. IEEE Press. April 23-29, 2006. 2006. 1-13.

二级参考文献8

共引文献2

同被引文献22

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部