浏览全部资源
扫码关注微信
国防科学技术大学 计算机学院,湖南 长沙 410073
[ "何明(1984-),男,广东从化人,国防科学技术大学博士生,主要研究方向为网络安全与网络计算、密码学。" ]
[ "邓罡(1983-),男,贵州晴隆人,国防科学技术大学博士生,主要研究方向为数据中心网络管理、云计算。" ]
[ "王宏(1964-),男,湖南益阳人,博士,国防科技大学副研究员,主要研究方向为网络流量分析。" ]
[ "龚正虎(1945-),男,湖南长沙人,国防科技大学博士生导师,主要研究方向为计算机网络与通信。" ]
网络出版日期:2013-11,
纸质出版日期:2013-11-25
移动端阅览
何明, 邓罡, 王宏, 等. 抗污染攻击的自适应网络编码传输机制[J]. 通信学报, 2013,34(11):81-91.
Ming HE, Gang DENG, Hong WANG, et al. Adaptive secure network coding scheme against pollution attacks[J]. Communication journal, 2013, 34(11): 81-91.
何明, 邓罡, 王宏, 等. 抗污染攻击的自适应网络编码传输机制[J]. 通信学报, 2013,34(11):81-91. DOI: 10.3969/j.issn.1000-436x.2013.11.010.
Ming HE, Gang DENG, Hong WANG, et al. Adaptive secure network coding scheme against pollution attacks[J]. Communication journal, 2013, 34(11): 81-91. DOI: 10.3969/j.issn.1000-436x.2013.11.010.
研究了网络编码中的污染攻击问题,提出了一种抗污染攻击的自适应网络编码传输机制ASNC(adaptive secure network coding)。在编码数据分组的传输过程中,该机制利用网络编码的时间和空间特性有效控制污染数据分组的传播。同时,ASNC机制创新性地促使网络编码系统动态调整安全策略,自适应于当前网络安全态势。此外,为了达到更好的实用性,ASNC机制有效利用网络编码的编码空间特性,不需要额外的安全数据通道和数据分组加密操作。ASNC机制的安全分析和仿真结果表明,其能够有效抵抗污染攻击,与不具有自适应能力的机制相比具有更好的安全效率。
The problem of pullution attacks was focused on and ASNC (adaptive secure network coding) scheme was proposed
which is an adaptive security scheme against pollution attacks in network coding systems. The proposed scheme allows participating nodes to detect polluted packets based on time and space properties of network coding. It is an innovative security scheme which can dynamically adjust the authentication strategy of participating nodes according to the security situation. In addition
ASNC scheme provides an efficient packet authentication without requiring the ex-istence of any extra secure channels. Security analysis and simulation of the scheme were also and the results demonstrate the practicality and efficiency of the ASNC scheme.
ADRIAN B , BONDY J A , MURTY U S R . Graph Theory: An Ad-vanced Course [M ] . London: Springer London Ltd , 2008 .
AHLSWEDE R , CAI N , LI S R . Network information flow [J ] . IEEE Transactions on Information Theory , 2000 , 46 : 1204 - 1216 .
SHWE H Y , ADACHI F . Power efficient adaptive network coding in wireless sensor networks [A ] . Proceedings of IEEE Inter ional Con-ference on Communications (ICC) [C ] . Kyoto , 2011 . 1 - 5 .
WU H , ZHENG J . Efficient network coding-based multicast retrans-mission mechanism for mobile communication networks [J ] . IET Communications , 2012 , 6 ( 2 ): 187 - 193 .
XU J B , WANG X , ZHAO J . Iswifter: improving chunked network coding for peer-to-peer content distribution [J ] . Peer-to-Peer Network-ing and Applications , 2012 , 5 ( 1 ): 30 - 39 .
LI S R , YEUNG RW , CAI N . Linear network coding [J ] . IEE Trans-actions on Information Theory , 2003 , 49 ( 2 ): 371 - 381 .
CAI N , CHAN T . Theory of secure network coding [J ] . Proceedings of the IEEE , 2011 , 99 ( 3 ): 421 - 437 .
CAI N , YEUNG R W . Secure network coding on a wiretap network [J ] . IEEE Transactions on Information Theory , 2011 , 57 ( 1 ): 424 - 435 .
YEUNG R W , CAI N . Network error correction, part I: basic concepts and upper bounds [J ] . Communications in Information and Systems , 2006 , 6 ( 1 ): 19 - 36 .
CAI N , YEUNG R W . Network error correction, part II: lower bounds [J ] . Communications in Information and Systems , 2006 , 6 ( 1 ): 37 - 54 .
SILVA D , KSCHISCHANG F R , KOETTER R . A rank-metric ap-proach to error control in random network coding [A ] . Proceedings of IEEE Information Theory Workshop on Information Theory for Wire-less Networks [C ] . Solstrand , 2007 . 1 - 5 .
ELIAS K , BAOCHUN L . Null keys: limiting malicious attacks via null space properties of network coding [A ] . Proceedings of IEEE Interna-tional Conference on Computer Communications (INFOCOM) [C ] . An-chorage , 2009 . 1224 - 1232 .
KROHN M N , FREEDMAN M J , MAZIERES D . On-the-fly verifica-tion of rateless erasure codes for efficient content distribution [A ] . Proceed-ings of IEEE Symposium on Security and Privacy [C ] . Oakland , 2004 . 226 - 240 .
LI Y P , YAO H Y , CHEN M H . RIPPLE authentication for network coding [A ] . Proceedings of IEEE International Conference on Com-puter Communications (INFOCOM) [C ] . San Diego , 2010 . 2258 - 2266 .
JING D , REZA C , CRISTINA N R . Practical defenses against pollu-tion attacks in intra-flow network coding for wireless mesh net-works [A ] . Proceedings of ACM Conference on Wireless Network Se-curity [C ] . Zurich , 2009 . 111 - 122 .
ADRIAN P , RAN C , TYGAR J D . The TESLA broadcast authentica-tion protocol [J ] . RSA CryptoBytes , 2002 , 5 : 1 - 13 .
KUN S , PENG N . Secure and resilient clock synchronizat on in wire-less sensor networks [J ] . IEEE Journal on Selected Areas in Commu-nications , 2006 , 24 ( 3 ): 395 - 408 .
DAN B , DAVID F , JONATHAN K . Signing a linear subspace: signa-ture schemes for network coding [A ] . Proceedings of International Conference on Practice and Theory in Public Key Crypto hy [C ] . Orange County, California , 2009 . 68 - 87 .
CHARLES D , JAIN K , LAUTER K . Signatures for network cod-ing [A ] . Proceedings of Annual Conference on the Information Sciences and Systems [C ] . Princeton , 2006 . 857 - 863 .
CHRISTOS G , PABLO R . Cooperative security for network coding file distribution [A ] . Proceedings of IEEE Internationa Conference on Computer Communications (INFOCOM) [C ] . Barcelona , 2006 . 1 - 13 .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构