期刊文献+

抗代间污染攻击的网络编码同态签名方案 被引量:3

Homomorphic Signature Scheme for Network Coding Against Inter-generation Pollution Attacks
下载PDF
导出
摘要 由于网络编码极易遭受网络中攻击者对数据包的恶意修改,从而使信宿节点对正确数据包的解码造成影响,如果攻击者不断重发与正确数据无关的恶意信息又会造成网络资源的极大浪费,所以为防止该种污染攻击,提出了一种基于代标识符的网络编码同态签名方案。该方案在基于RSA的同态签名方案可防止污染攻击的基础上,通过对每代数据包引入代标识符,从而可进一步防止攻击者的重放攻击。由于方案不需额外安全信道并且采用线性运算,故可降低对节点计算能力的要求及方案安全开销。重点对方案的攻击模式进行了详细分析,并证明了其安全性。最后通过开销分析证明了该方案与基于RSA同态签名方案在开销近似相等的前提下还可有效解决代间污染攻击造成的消息串扰问题。 Because network coding is vulnerable in the network attacker to malicious modification of packet, affecting the correct packet decoding for obtaining-information node. If an attacker continually resends malicious information without relation to correct data, it will lead to enormous waste of network resources. In order to prevent the pollution attack,a generation-identifier based homomorphic signature scheme for network coding is proposed. On the basis of preventing pollution attacks for the RSA-based homomorphic signature scheme,it can prevent the replay attack further by using generation-identifier into packets. This scheme does not need any extra secure channel and uses linear calculation, so it can reduce the requirements of computing ability of the node and the cost of the scheme. The attack mode of the scheme is analyzed in detail,and its security is proved. Finally,the cost analysis proves that on the premise of approximately equal cost between this scheme and the homomorphic signature scheme based on RSA, it also can effectively solve the crosstalk problems caused by inter-generation pollution attack.
出处 《计算机技术与发展》 2016年第10期73-76,共4页 Computer Technology and Development
基金 国家科技重大专项(2010zx03003-003)
关键词 网络编码 污染攻击 同态签名 重放攻击 network coding pollution attack homomorphic signature replay attack
  • 相关文献

参考文献14

  • 1Ahlswede R, Cai N, Li S Y R, et al. Network information flow [ J]. IEEE Transactions on Information Theory ,2000,46 (4) : 1204-1216.
  • 2Li S Y R, Yeung R W, Cai N. Linear network coding [ J ]. IEEE Transactions on Information Theory,2003,49 (2) :371- 381.
  • 3黄佳庆,UZP.网络编码原理[M].北京:国防工业出版社,2012.
  • 4Fragouli C, Boudec J, Widmer J. Network coding: an instant primer[ J ]. ACM SIGCOMM Computer Communication Re- view,2006,36 ( 1 ) : 63 -68.
  • 5曹张华,唐元生.安全网络编码综述[J].计算机应用,2010,30(2):499-505. 被引量:11
  • 6Ho T, Leong B, Koetter R. Byzantine modification detection in multicast networks using randomized network coding [ C ]// Proceedings of IEEE international symposium on information theory. Massachusetts, USA: IEEE ,2008:2798-2803.
  • 7Gkantsidis C, Rodriguez P. Cooperative security for network coding file distribution[ C]//Preceedings of international con- ference on computer communications. Barcelona, Spain: [ s. n. ] ,2006:367-380.
  • 8Menezes A, Okamoto T,Vanstone S. Reducing elliptic curve logorithms to log0rithms in a finite field [ J ]. IEEE Transac- tions on Information Theory, 1993,39 (5) : 1639-1646.
  • 9Krohn M N,Freedman M J,Mazicres D. On the-fly verifica- tion of rateless erasure codes for efficient content distribution [ C]//Proc of IEEE symposium on security and privacty. [ s. 1. ] :IEEE ,2004:226-240.
  • 10Yu Z, Wei Y, Ramkumar B. An efficient signature- based scheme for securing network coding against pollution attacks [ C ]//Proceedings of international conference on computer Arizona, USA: [ s. n. ] ,2008 : 1409-1417.

二级参考文献32

  • 1陈晶,李彤,杜瑞颖,傅建明,刘建伟.Efficient Reliable Opportunistic Network Coding Based on Hybrid Flow in Wireless Network[J].China Communications,2011,8(4):125-131. 被引量:5
  • 2王路,刘立祥,胡晓惠.Transmission Technique towards Seamless Handover for NGEO Satellite Networks[J].China Communications,2011,8(5):88-95. 被引量:1
  • 3AHLSWEDE R, CAl Ning, LI S Y R, et al. Network Information Flow[J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204-1216.
  • 4LI S-Y R, YEUNG R W, CAl Ning. Linear Network Coding[J]. IEEE Transactions on Information Theory, 2003, 49(2): 371-381.
  • 5HO T, MEDARD M, KOETTER R, et al. A Random Linear Network Coding Approach to Multicast[J]. IEEE Transactions on Information Theory, 2006, 52(10): 4413-4430.
  • 6FRAGOULI C, SOLJANIN E. Network Coding Applications[J]. Foundations and Trends in Networking, 2007, 2(2): 135-269.
  • 7HO T, LEONG B, KOETTER R, et al. Byzantine Modification Detection in Multicast Networks Using Randomized Network Coding[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2798-2803.
  • 8JAGGI S, LANGBERG M, KATTl S, et al. Resilient Network Coding in the Presence of Byzantine Adversaries[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2596-2603.
  • 9KROHN M N, FREEDMAN M J, MAZIERES D. On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution[C]// IEEE Symposium on Security and Privacy: May 9-12, 2004. Berkeley, CA, USA IEEE Press, 2004: 226-240.
  • 10GKANTSIDIS C, RODRIGUEZ P R. Cooperative Security for Network Coding File Distribution [C]// Proceedings of the 25th IEEE International Conference on Computer Communications (lNFOCOM): April 23-29, 2006. Barcelona, Spain. IEEE Press, 2006: 1-13.

共引文献19

同被引文献16

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部