计算机科学 ›› 2013, Vol. 40 ›› Issue (10): 144-147.
曹张华,吉晓东,刘敏
CAO Zhang-hua,JI Xiao-dong and LIU Min
摘要: 在窃听者窃听能力受限的网络中使用网络编码传输数据时,将网络编码允许中间节点混合收到的数据组这一特点与传统密码学中一次一密的思想相结合,提出了一个基于线性网络编码的有效对抗窃听攻击的安全通信方案。该方案无需秘密信道传输密钥,同时网络容量的使用率达到n-1n。而且,当网络编码的系数域足够大时,该保密通信方案使用随机网络编码实现安全通信的概率趋于1。
[1] Ahlswede R,Cai N,Li S Y R,et al.Network Information Flow [J].IEEE Trans.Inf.Theory,2000,46(4):1204-1216 [2] Li S Y R,Cai N.Linear Network Coding[J].IEEE Trans.Inf.Theory,2003,49(2):371-381 [3] Ozarow L H,Wyner A D.The wire-tap channel II [J].Bell Syst Tech.J,1984,3:2135-2157 [4] Rouayheb S E,Soljanin E,Sprintson A,et al.Secure Network Coding for Wiretap Networks of Type II [J].IEEE Trans.Inf.Theory,2012,58(3):1361-1371 [5] Cai N,Yeung R W.Secure network coding on a wiretap network[J].IEEE Trans.Inf.Theory,2011,57(1):424-435 [6] Silva D,Kschischang F R.Universial Secure Network Coding via Rank-Metric Codes [J].IEEE Trans.Inf.Theory,2011,57(2):1124-1135 [7] Lima L,Gheorghiu S,Barros J,et al.Secure Network Coding for Multi-Resolution Wireless Video Streaming [J].IEEE Selected areas in Comm,2010,28(3):377-388 [8] Yan Z,Xu C Q,Wang F.A Novel Scheme for Secure Network Coding Using One-time Pad [C]∥Conf on Networks Security,Wireless Comm and Trusted Computing.2009:92-98 [9] Jaggi S,Langberg M,Katti S,et al.Resilient Network Coding in the Presence of Byzantine Adversaries [J].IEEE Trans.Inf.Theory,2008,54(6):2596-2603 [10] Ho T,Leong B,Koetter R,et al.Byzantine Modification Detection in Multicast Networks with Random Network Coding [J].IEEE Trans.Inf.Theory,2008,54(6):2798-2803 [11] Jaggi S,Sanders P,Chou P A,et al.Polynomial time algorithms for multicast network code construction [J].IEEE Trans.Inf.Theory,2005,51(6):1973-1982 [12] Cui T,Hot T,Kliewer J.On Secure Network Coding with Nonuniform or Restricted Wiretap Set [J].IEEE Trans.on Inf.Theory,2013,59(1):166-176 [13] 徐光宪,付晓.抗万能攻击的安全网络编码[J].计算机科学,2012,39(8):88-91 [14] 朱联祥,朱艳艳,曹铮.搭线窃听下网络安全路径及安全网络编码的研究[J].重庆邮电大学学报,2012,24(1):39-44 [15] 俞立峰,杨琼,于娟.防窃听攻击的安全网络编码[J].计算机应用研究,2012,29(3):813-818 |
No related articles found! |
|