首页> 外文会议>2013 International Conference on Information Technology and Applications >Efficient Weakly-Secure Network Coding Scheme Against Nodes Conspiracy Attack for Multicast System
【24h】

Efficient Weakly-Secure Network Coding Scheme Against Nodes Conspiracy Attack for Multicast System

机译:一种针对节点共谋攻击的高效弱安全网络编码方案

获取原文
获取原文并翻译 | 示例

摘要

Since network information flow can achieve the max-flow in theory and the network throughput is increased by using network coding. At the same time, the security of network coding is of importance as the research of network coding increase. Different from previous wiretapping scenarios where the threat is posed by external wiretappers. We discuss the security in an internal angle: all intermediate nodes comply with the communication protocols which are potential wiretappers and the wiretappers can cooperate with each other to decode the packets sent from the source node. Most existing research on network coding designs with a given topology, we will consider the secure network topology design. In this paper, our purpose is to find the secure transmission topology that is suitable for network coding in transmission system. Based on the secure topology, we use network coding scheme which is weakly secure. Mathematical analysis and computer simulations show that the proposed protocol can prevents cooperative eavesdroppers from acquiring any useful information transmitted from source node to sink node.
机译:由于网络信息流理论上可以达到最大流,并且通过使用网络编码可以提高网络吞吐量。同时,随着网络编码研究的增加,网络编码的安全性也变得越来越重要。与以前的窃听方案不同,后者是由外部窃听者构成威胁的。我们从内部角度讨论安全性:所有中间节点都遵守潜在的窃听者的通信协议,窃听者可以相互协作以解码从源节点发送的数据包。对于给定拓扑结构的大多数现有网络编码设计研究,我们将考虑安全网络拓扑设计。在本文中,我们的目的是找到适合传输系统中网络编码的安全传输拓扑。基于安全拓扑,我们使用安全性较弱的网络编码方案。数学分析和计算机仿真表明,该协议可以防止协作窃听者获取从源节点到宿节点传输的任何有用信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号