首页> 外文学位 >Enhancing network security via error-correcting codes.
【24h】

Enhancing network security via error-correcting codes.

机译:通过纠错码增强网络安全性。

获取原文
获取原文并翻译 | 示例

摘要

Network security has received increased attention because of the explosive growth of computers, networks, and information technologies on one side and the threats or attacks that have happened, are happening, or may happen on the other side. One of the major problems over the Internet today is the denial of service (DoS) attacks. Multicasting is an efficient solution for group communication on the Internet. Multicast security is motivated by the enforcement of group access control, confidentiality and authentication of data transmission, and protection of the network infrastructure. In this dissertation, we develop an efficient IP traceback scheme based on error-correcting codes to defend against DoS attacks. The new scheme aims at releasing the cooperation of all the intervening ISPs, reducing the overhead in the IP header, and increasing the feasibility compared to available IP traceback schemes. We also construct three practical multicast re-keying schemes by using the Reed-Solomon codes and Algebraic Geometric codes. The analysis shows that there are no computational assumptions required for our schemes and the storage complexity is reduced greatly. Furthermore, we use Algebraic Geometric codes to solve the traitor tracing problem over the multicast channel. The obtained public key tracing scheme is deterministic and can trace all the participated traitors. Compared with other schemes available, our scheme can accommodate more users and tolerate more colluders given a fixed length of private keys.
机译:由于一方面计算机,网络和信息技术的爆炸性增长,另一方面已发生,正在发生或可能发生的威胁或攻击,网络安全受到了越来越多的关注。当今,Internet上的主要问题之一是拒绝服务(DoS)攻击。组播是Internet上组通信的有效解决方案。多播安全性是通过实施组访问控制,数据传输的机密性和身份验证以及网络基础结构的保护来激发的。本文基于纠错码,开发了一种有效的IP回溯方案来防御DoS攻击。与可用的IP回溯方案相比,新方案旨在释放所有中间ISP的合作,减少IP报头中的开销,并提高可行性。我们还使用Reed-Solomon码和代数几何码构造了三种实用的多播密钥更新方案。分析表明,我们的方案不需要计算假设,并且存储复杂度大大降低了。此外,我们使用代数几何代码来解决多播信道上的叛徒追踪问题。所获得的公钥跟踪方案是确定性的,并且可以跟踪所有参与的叛徒。与其他可用方案相比,给定固定私钥长度,我们的方案可以容纳更多用户并容忍更多串通者。

著录项

  • 作者

    Bai, Chunyan.;

  • 作者单位

    University of Louisiana at Lafayette.;

  • 授予单位 University of Louisiana at Lafayette.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2004
  • 页码 130 p.
  • 总页数 130
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号