期刊文献+

基于纠错码的数据分片传输方案 被引量:1

DATA SEGMENTATION TRANSMISSION SCHEME BASED ON ERROR CORRECTION CODE
下载PDF
导出
摘要 切片重组技术是将完整数据分成若干切片来保护其在传输和重组过程中隐私性的方法。为了进一步保证数据的安全,同时提高传输的鲁棒性,提出一种基于纠错码技术的数据分片传输方案。将完整数据切分后采用Reed-Solomon码进行编码,并利用可更新哈希链生成共享密钥对切片顺序进行置换,汇聚节点可利用满足限值的部分切片来恢复原始数据。分析和仿真证明了该方案中数据的隐私性和传输的鲁棒性,并减少了攻击或损坏对数据传输的影响。 Slice recombination technology is one of the main methods for data security transmission in wireless networks,which divides the complete data into several slices and then recombines them.In order to further ensure the security of data and improve the robustness of transmission,this paper proposes a data fragmentation transmission scheme based on error correction code.In this scheme,the complete data were segmented,and Reed-Solomon code was used to encode them.The shared key generated by the updatable hash chain was used to replace the slice order.The aggregation node could recover the original data by using partial slices satisfying the limit.The analysis and simulation show that this scheme not only guarantees the privacy in the process of data transmission,but also improves the robustness of data transmission and reduces the impact of attack or damage on data transmission.
作者 刘冰 马壮 陈宜栋 Liu Bing;Ma Zhuang;Chen Yidong(Department of Cryptography Science and Technology,Beijing Electronic Science and Technology Institute,Beijing 100070,China)
出处 《计算机应用与软件》 北大核心 2021年第9期322-327,共6页 Computer Applications and Software
基金 中央高校基本科研业务费项目(328201916)。
关键词 切片重组 REED-SOLOMON码 哈希链 隐私保护 鲁棒性 Slicing and recombination Reed-Solomon code Hash chain Privacy protection Robustness
  • 相关文献

参考文献4

二级参考文献17

  • 1张亦辰,李继国,汤铭.自认证公钥代理签名方案[J].北京电子科技学院学报,2005,13(2):19-22. 被引量:1
  • 2王新梅 肖国镇.纠错码-原理与算法[M].西安:西安电子科技大学出版社,1996..
  • 3傅海阳,SDH微波通信系统,2000年
  • 4王新梅,纠错码—原理与算法,1996年
  • 5归绍升,纠错编码技术和应用,1988年
  • 6Estrin D, Govindan R, Heidemann J, et al. Next century challenges: scalable coordination in sensor networks [ C]//Proceeding of the fifth Annual International Con- ference on Mobile Computing and Networks. Seattle, Washington, USA, 1999 : 89 - 92.
  • 7Pottle G, Kaiser W. Wireless integrated network sen- sors [ C]//Communication of the ACM. New York, NY, USA, 2000 : 263 - 270.
  • 8Chen Hao. Efficient compromising resilient authentica- tion schemes for large scale wireless sensor networks [ C ]//3rd ACM Conference on Wireless Network Secu- rity. Hoboken, NJ, USA,2010: 99- 102.
  • 9Qin Ronghus, Sun Qi, You Xing, et al. A key man- agement scheme for manually deployed wireless sensor networks based on dual directional hash chains [ C ]// 2nd International Conference on Intelligent Systems De- sign and Engineering Applications. Sanya, China, 2012: 43(5):23 -30.
  • 10Shwe Hninyu, Adachi Funiyunki. Power efficient adap- tive network coding in wireless sensor networks[C ]// IEEE International Conference on Communications. Kyoto, Japan, 2011: 5963363.

共引文献24

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部