期刊文献+

面向智能家居的音视频文件安全传输方法研究 被引量:3

Method of secure transmission for audio and video files based on smart home
下载PDF
导出
摘要 目前基于智能家居的音视频文件在文件传输过程中存在信息泄露等安全问题;此外,智能家居设备普遍受算力和带宽限制。针对此背景,在网络数据包传输理论的基础上,提出一个音视频文件安全传输的方法。该方法将音视频文件的特征部分与数据部分进行切分,形成编码的数据包序列,并对数据包按序列重新排序后传输,保证数据传输的安全性。实验结果表明,该方法传输效率高、算力代价低,能够在受限的环境下实现音视频文件的安全传输。 At present,the audio and video files based on smart home have security problems such as information leakage during the file transmission,and the smart home equipments are generally limited by hashrate and bandwidth. Based on this background,a method of the secure transmission of audio and video files is proposed based on the theory of network packet transmission. In this method,the file signature part and the data part of the audio and video files are divided to form the encoded data-packet sequence. The data packets are reordered and transmitted to ensure the security of data transmission. The experimental results show that this method has high transmission efficiency and low hashrate cost,and can realize the secure transmission of audio and video files in a restricted environment.
作者 王顺业 杜彦辉 芦天亮 WANG Shunye;DU Yanhui;LU Tianliang(College of Information Technology&Cyber Security,People's Public Security University of China,Beijing 100038,China)
出处 《现代电子技术》 北大核心 2020年第12期182-186,共5页 Modern Electronics Technique
基金 国家重点研发计划“网络空间安全”重点专项(2016YFB0801100) 国家自然科学基金项目(61602489) “十三五”国家密码发展基金密码理论研究课题(MMJJ20180108)。
关键词 智能家居 音视频文件 安全传输 文件特征 数据包编码 测试分析 smart home audio and video file secure transmission file signature data packet coding testing analysis
  • 相关文献

参考文献5

二级参考文献25

  • 1游晗,和应民.通信中间件在GSM网络监控系统中的应用[J].自动化技术与应用,2005,24(5):45-47. 被引量:1
  • 2SCHNEIDER FB. Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial[J]. ACM Computing Surveys,1990, 22(4) : 299 - 319.
  • 3CASTRO M. Practical Byzantine Fault Tolerance[D]. Technical Report MIT/LCS/TR-817. MIT Laboratory for Computer Science,Cambridge, MA, 2001.
  • 4RODRIGUES R, LISKOV B. Rosebud: A Scalable Byzantine-Fault-Tolerant Storage Architecture[R]. MIT CSAIL Technical Report TR/932, 2003.
  • 5AMIR Y, WOOL A. Optimal Availability Quorum Systems: Theory and Practice[J]. Information Processing Letters, 1998, 65 (5) : 223- 228.
  • 6GIFFORD DK. Weighted Voting for Replicated Data[A]. Proceedings of the seventh ACM symposium on Operating systems principles table of contents[C].Pacific Grove, California, United States,1979. 150 - 162.
  • 7MALKHI D, REITER M, WOOL A. The load and availability of Byzantine quorum systems[A]. Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing[C]. Santa Barbara, California, United States, 1997.249-257.
  • 8MALKHI D, REITER MK. Persistent objects in the fleet system[A]. Proceedings of the 2nd DARPA Information Survivability Conference and Exposition ( DISCEX Ⅱ) [C], 2001.
  • 9MARTIN JP, ALVISI L. A Framework for Dynamic Byzantine Storage[A]. 2004 International Conference on Dependable Systems and Networks ( DSN 2004) [C]. Florence, Italy: IEEE Computer Society, 2004. 325 - 334.
  • 10LAKSHMANAN S , AHAMAD M , VENKATESWARAN H .Responsive Security for Stored Data[J]. IEEE Transactions on parallel and distributed system, 2003, 14(9):818 -828.

共引文献25

同被引文献40

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部