期刊文献+

抗多种攻击的网络编码安全方案

Network coding security scheme against multiple attacks
下载PDF
导出
摘要 为解决目前网络编码安全方案研究目标不全面,安全性不高等问题,文章提出一种可以同时抵抗多种攻击方式的网络编码安全方案。本方案共有两个阶段分别应对窃听攻击和污染攻击。第一阶段首先选取部分信源消息生成预编码系数矩阵,并通过AES加密系统对其加密。然后用预编码矩阵对剩余的消息线性组合,使本方案可以抵抗网络窃听攻击。第二阶段给第一阶段处理后的消息生成签名,同时引入代标识符以及时间戳两个参数,来抵御无线网络中的代间污染攻击和代内污染攻击以及网络中的重放攻击。结果表明,本方案不仅能抵抗多种攻击,且编码复杂度较低,更加贴合实际应用。 In order to solve the problem that the research target of network coding security scheme is not comprehensive and the security is not high,this paper proposes a network coding security scheme which can resist multiple attack modes at the same time.The scheme has two phases,one for eavesdropping attacks and the other for contamination attacks.In the first stage,some source messages are selected to generate a precoding coefficient matrix and encrypted by AES encryption system.Then the precoded matrix is used to combine the rest of the messages linearly to make the scheme resistant to network eavesdropping attacks.In the second stage,signatures are generated for the messages processed in the first stage,and two parameters,generation identifier and time stamp,are introduced to resist inter-generation pollution attacks,intra-generation pollution attacks and replay attacks in the wireless network.The results show that this scheme can not only resist various attacks,but also has low coding complexity which is more suitable for practical application.
作者 王如垒 褚丽莉 闫佳慧 王铁缘 WANG Rulei;CHU Lili;VAN Jiahui;WANG Tieyuan(School of Electronic&Information Engineering,Liaoning University of Technology,Jinzhou Liaoning 121001,China)
出处 《长江信息通信》 2023年第3期24-27,34,共5页 Changjiang Information & Communications
关键词 网络编码 窃听攻击 污染攻击 重放攻击 network coding Eavesdropping attacks Pollution attack replay attack
  • 相关文献

参考文献4

二级参考文献46

  • 1AHLSWEDE R, CAI Ning, LI S R, et al. Network information flow[J]. IEEE Transactions on Infor- mation Theory, 2000, 46(4): 1204-1216.
  • 2LI S R, YEUNG R W, CAI Ning. Linear network coding[J]. IEEE Transactions on InformationTheory, 2003, 49(2): 371-381.
  • 3HO T, MI]DARD M, KOETTER R, et el. A random linear network coding approach to multicast[J]. IEEE Transactions on Information Theory, 2006, 52(10): 4413-4430.
  • 4CHEN Lijun, Ho T, Chiang M, et al. Congestion Control for Multicast Flows with Network Cod- ing[J]. IEEE Transactions on Information Theory, 2012, 58: 5908-5921.
  • 5KOETTER R, KSCHISCHANG F R. Coding for er- rors and erasures in random network coding[J]. IEEE Transactions on Information Theory, 2008, 54: 3579-3591.
  • 6WlDMER J, BOUDEC J-Y L. Network coding for efficient communication in extreme net- works[C]//Proceedings of SIGCOMM'05 work- shop on Delay-tolerant networking. New York, NY, USA: ACM, 2005: 284-291.
  • 7FRAGOULI C, SOLJANIN E. Network Coding Applications[J]. Foundations and Trends in Net- working, 2007, 2(2): 135-269.
  • 8CAI Ning, Yeung R W. Secure network cod- ing[C]//Proceedings of International Sympo- sium in Information Theory, Lausanne, Switzer- land: IEEE Press, 2002: 323.
  • 9CAI Ning, YEUNG R W. Secure Network Coding on a Wiretap Network[J]. IEEE Transactions on Information Theory, 2011, 57(1): 424-435.
  • 10FELDMAN J, MALKIN T, SERVEDIO R A, et al. On the capacity of secure network coding[C]//Pro- ceedings of 42nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, 2004: 388-401.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部