计算机科学 ›› 2014, Vol. 41 ›› Issue (9): 174-177.doi: 10.11896/j.issn.1002-137X.2014.09.033

• 信息安全 • 上一篇    下一篇

基于抗窃听和拜占庭攻击的随机网络编码

赵佳佳,任平安   

  1. 陕西师范大学计算机科学学院 西安710062;陕西师范大学计算机科学学院 西安710062
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金项目:高性能保密计算算法与协议(61070189)资助

Random Network Coding Based on Anti-eavesdropping and Byzantine Adversaries

ZHAO Jia-jia and REN Ping-an   

  • Online:2018-11-14 Published:2018-11-14

摘要: 随机网络编码目前被广泛应用于实际网络环境中,能够有效提高网络吞吐量。然而网络编码容易受到窃听攻击和拜占庭攻击。提出一种既防窃听,又能有效检测出拜占庭攻击的安全随机网络编码算法。在信源和信宿之间共享秘密信道,该算法通过哈希函数增加少量计算量和少量冗余,实现防窃听攻击和防拜占庭攻击。该算法仅在随机网络编码的基础上改变了信源节点的编码方式和信宿节点的解码方式,中间节点编码方式保持不变,具有较高的编码效应。

关键词: 网络编码,窃听,拜占庭,哈希函数,安全信道

Abstract: Random network coding has been widely applied in the actual network environment,and can effectively improve network throughput.However,network coding is vulnerable to eavesdropping attack and Byzantine attack.This paper presented a random network coding algorithm that can prevent the eavesdropping adversaries and effectively detect Byzantine modification.There is a secret channel sharing between the source and destination,and the algorithm increases a few computations and redundancies to achieve anti- eavesdropping attack and anti- Byzantine attack through the hash function.The algorithm only changes the encoding method of the source node and the decoding method of the destination node based on the random network coding,and the intermediate nodes remain unchanged.It has a high coding efficiency.

Key words: Network coding,Eavesdropping,Byzantine,Hash function,Secure channel

[1] Ahlswede R,Cai N,Li S-Y R,et al.Network information flow[J].IEEE Transactions on Information Theory,2000,46:1204-1216
[2] Li S-Y R,Yeung R W,Cai N.Linear network coding[J].IEEE Transactions on Information Theory,2003,49:371-381
[3] Ho T,Medard M,Shi J,et al.On randomized network coding[C]∥41st Annual Allerton Conference on Communication Control and Computing.Oct.2003
[4] Ho T,Leong B,Koetter R,et al.Toward a random operation of networks[J].IEEE Transactions on Information Theory,submitted,2004
[5] Cai N,Yeung R W.Secure network coding[C]∥International Symposium on Information Theory (ISIT) 2002.Lausanne,Switzerland,2002:30-50
[6] Bhattad K,Narayanan K R.Weakly secure network coding[C]∥Proc.1st Workshop Netw.Coding Theory Appl,Apr.2005
[7] Ho T.Networking from a network coding perspective [D].MIT,2004
[8] Jaggi S,Langberg M,Katei S.Resilient Network Coding in the Presence of Byzantine Adversaries [C]∥26th IEEE International Conference on Computer Communications.Anchorage:IEEE Press,2012:616-624
[9] Nutman L,Langberg M.Adversarial Models and ResilientSchemes for Network Coding [C]∥IEEE Intl Symp Inf Theory.Toronto:IEEE Press,2008:171-175
[10] Cai N,Yeung R W.Network Coding and Error Correction [C]∥IEEE Inform Theory Workshop.Bangalore:IEEE Press,2002:119-122
[11] Zhang Z.Network Error Correction Coding in Packetized Networks [C]∥IEEE Information Theory Workshop Chengdu, ITW’06.IEEE Press,Chengdu,2006:433-437
[12] Zhang Z.Linear Network Error Correction Codes in Packet Networks [J].IEEE Trans on Inf Theory,2012,54(1):209-218
[13] 韦勇,连一峰.基于日志审计与性能修正算法的网络安全态势评估模型[J].计算机学报,2009,32(4):763-772
[14] Ho T,Leong B,Koetter R.Byzantine Modification Detection in Multicast Networks with Random Network Coding [J].IEEE Transactions on Information Theory,2012,54(6):2798-2830
[15] 周业军,李晖,马建峰.一种防窃听的随机网络编码 [J].西安电子科技大学学报,2009,35(1):696-701
[16] 武广柱,王劲林,齐卫宁.ARLNCStream:自适应随机网络编码流媒体系统[J].电子与信息学报,2008,30(1):25-28
[17] 王汝言,楼芃雯,樊思龙,等.容迟网络编码节点状态感知的数据转发策略[J].重庆邮电大学学报:自然科学版,2013,5(2):215-220

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!