计算机科学 ›› 2013, Vol. 40 ›› Issue (10): 144-147.

• 信息安全 • 上一篇    下一篇

网络编码在窃听网络中的应用

曹张华,吉晓东,刘敏   

  1. 南通大学电子信息学院 南通226019;南通大学电子信息学院 南通226019;南通大学电子信息学院 南通226019
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金项目(61174065),江苏省高校自然科学研究面上项目(10KJB510020),南通大学项目(03080411)资助

Application of Network Coding in Wiretap Network

CAO Zhang-hua,JI Xiao-dong and LIU Min   

  • Online:2018-11-16 Published:2018-11-16

摘要: 在窃听者窃听能力受限的网络中使用网络编码传输数据时,将网络编码允许中间节点混合收到的数据组这一特点与传统密码学中一次一密的思想相结合,提出了一个基于线性网络编码的有效对抗窃听攻击的安全通信方案。该方案无需秘密信道传输密钥,同时网络容量的使用率达到n-1n。而且,当网络编码的系数域足够大时,该保密通信方案使用随机网络编码实现安全通信的概率趋于1。

关键词: 窃听者,网络编码,组播,网络安全,随机网络编码

Abstract: Focusing on the issue of secure communication on a wiretap network where a wiretapper can eavesdrop a limi-ted number of links,we proposed a secure communication scheme based on linear network coding.The key idea of our scheme is to combine the ability of network coding that allows intermediate nodes to mix information from different data flows with one time pad.Further,the presented scheme achieves secure communication without employing a secrecy channel and the utilization of network capacity is up to n-1n.Moreover,we showed that if the efficient domain is large enough,the probability of achieving secure communication with random linear network coding tends to 1in our scheme.

Key words: Wiretapper,Network coding,Multicast,Network security,Random network coding

[1] Ahlswede R,Cai N,Li S Y R,et al.Network Information Flow [J].IEEE Trans.Inf.Theory,2000,46(4):1204-1216
[2] Li S Y R,Cai N.Linear Network Coding[J].IEEE Trans.Inf.Theory,2003,49(2):371-381
[3] Ozarow L H,Wyner A D.The wire-tap channel II [J].Bell Syst Tech.J,1984,3:2135-2157
[4] Rouayheb S E,Soljanin E,Sprintson A,et al.Secure Network Coding for Wiretap Networks of Type II [J].IEEE Trans.Inf.Theory,2012,58(3):1361-1371
[5] Cai N,Yeung R W.Secure network coding on a wiretap network[J].IEEE Trans.Inf.Theory,2011,57(1):424-435
[6] Silva D,Kschischang F R.Universial Secure Network Coding via Rank-Metric Codes [J].IEEE Trans.Inf.Theory,2011,57(2):1124-1135
[7] Lima L,Gheorghiu S,Barros J,et al.Secure Network Coding for Multi-Resolution Wireless Video Streaming [J].IEEE Selected areas in Comm,2010,28(3):377-388
[8] Yan Z,Xu C Q,Wang F.A Novel Scheme for Secure Network Coding Using One-time Pad [C]∥Conf on Networks Security,Wireless Comm and Trusted Computing.2009:92-98
[9] Jaggi S,Langberg M,Katti S,et al.Resilient Network Coding in the Presence of Byzantine Adversaries [J].IEEE Trans.Inf.Theory,2008,54(6):2596-2603
[10] Ho T,Leong B,Koetter R,et al.Byzantine Modification Detection in Multicast Networks with Random Network Coding [J].IEEE Trans.Inf.Theory,2008,54(6):2798-2803
[11] Jaggi S,Sanders P,Chou P A,et al.Polynomial time algorithms for multicast network code construction [J].IEEE Trans.Inf.Theory,2005,51(6):1973-1982
[12] Cui T,Hot T,Kliewer J.On Secure Network Coding with Nonuniform or Restricted Wiretap Set [J].IEEE Trans.on Inf.Theory,2013,59(1):166-176
[13] 徐光宪,付晓.抗万能攻击的安全网络编码[J].计算机科学,2012,39(8):88-91
[14] 朱联祥,朱艳艳,曹铮.搭线窃听下网络安全路径及安全网络编码的研究[J].重庆邮电大学学报,2012,24(1):39-44
[15] 俞立峰,杨琼,于娟.防窃听攻击的安全网络编码[J].计算机应用研究,2012,29(3):813-818

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!