《计算机应用研究》|Application Research of Computers

高效自适应的抗污染攻击网络编码传输方案

Efficient and adaptive network coding transmission scheme against pollution resistance

免费全文下载 (已被下载 次)  
获取PDF全文
作者 姚玉坤,吕盼成,王宇
机构 重庆邮电大学 移动通信技术重庆市重点实验室,重庆 400065
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2018)03-0879-05
DOI 10.3969/j.issn.1001-3695.2018.03.050
摘要 针对中间节点对收到的所有编码包进行验证浪费网络资源和目的节点解码速率慢等问题进行研究,提出一种高效自适应的抗污染攻击网络编码传输方案-EANC(efficient and adaptive network coding transmission scheme against pollution attack)。EANC方案在数据分组编码阶段,利用按照网络编码的时间和空间特性构造的线性子空间签名方案准确地验证数据分组是否被污染从而有效控制污染数据分组的传播,并且能使中间节点调节验证步骤使之自适应于当前网络的污染程度,从而提高验证效率;在目的节点解码阶段,EANC方案利用目的节点重传恢复机制降低解码恢复时延。仿真结果表明,EANC方案能够减少子空间的签名长度并且降低目的节点解码恢复的平均时延。
关键词 网络编码;安全;污染攻击;自适应验证;重传恢复
基金项目 重庆市科委自然科学基金资助项目(cstc2012jjA40040)
重庆市基础与前沿研究计划资助项目(cstc2015jcyjBX0085)
本文URL http://www.arocmag.com/article/01-2018-03-050.html
英文标题 Efficient and adaptive network coding transmission scheme against pollution resistance
作者英文名 Yao Yukun, Lyu Pancheng, Wang Yu
机构英文名 KeyLaboratoryofMobileCommunicationsTechnologyofChongqing,ChongqingUniversityofPosts&Telecommunications,Chongqing400065,China
英文摘要 In order to solve the problem that intermediate node verifies all the encoded packets wasting the network resources and the slow decoding rate of the destination node, this paper proposed an efficient and adaptive network coding transmission scheme which called EANC. In data packet encoding stage, EANC scheme used network encoding time and space characteristics to structure linear subspace signature scheme, the scheme was accurate verification of data packets effectively and control the spread of pollution data packets, EANC scheme could make the middle nodes adjust detection step adapt to the current network pollution level and improved verification efficiency; at the destination node decoding stage, EANC scheme used the destination node packet loss retransmission mechanism to reduce the decoding delay. The simulation results show that the EANC scheme can reduce the time of the linear subspace signature and reduce the average time delay of the decoding and recovery of the destination node.
英文关键词 network coding; secure; pollution attack; adaptive authentication; retransmission recovery
参考文献 查看稿件参考文献
  [1] Ahlswede R, Cai N, Li S Y R, et al. Network information flow[J] . IEEE Trans on Information Theory, 2000, 46(4):1204-1216.
[2] 黄征, 王新. 网络编码中的优化问题的研究[J] . 软件学报, 2009, 20(5):1349-1361.
[3] 俞立峰, 杨琼. 防窃听攻击的安全网络编码[J] . 计算机应用研究, 2012, 29(3):813-818.
[4] 曹张华, 唐元生. 安全网络编码综述[J] . 计算机应用, 2010, 30(2):499-505. [5] 陈福臻, 程久军, 廖竞学, 等. 基于网络编码的同态hash抗污染攻击系统研究[J] . 信息网络安全, 2015, 22(6):33-40.
[6] Ho T, Leong B, Koetter R. Byzantine modification defection in multicast networks using randomized network coding[C] //Proc of IEEE International Symposium on Information Theory. [S. l. ] :IEEE Press, 2008:2798-2803.
[7] He Ming, Chen Lin, Wang Hong, et al. An adaptive security scheme for network coding[C] //Proc of IEEE Asia-Pacific Services Computing Conference. [S. l. ] :IEEE Press, 2012:309-3014.
[8] 裴恒利, 尚涛, 刘建伟. 融合时间戳和同态签名的安全网络编码方法[J] . 通信学报, 2013, 34(4):28-35.
[9] Wu Xiaohu, Xu Yinlong, Yuen C, et al. A tag encoding scheme against pollution attack to linear network coding[J] . IEEE Trans on Parallel Distributed Systems, 2014, 25(1):33-42.
[10] Cheng Chi, Lee Jemin, Jiang Tao, et al. Security analysis and improvements on two homomorphic authentication scheme for network coding[J] . IEEE Trans on Information Forensics and Security, 2016, 11(5):993-1002.
[11] Esfahani A, Yang Du, Mantas G, et al. Dual-homomorphic message authentication code scheme for network coding-enabled wireless sensor networks[C] //Proc of the 9th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks. [S. l. ] :IEEE Press, 2014:80-84.
[12] 王海鹏, 梅中辉. 一种基于安全网络编码技术的抗污染攻击机制[J] . 计算机技术与发展, 2016, 27(6):94-99.
[13] Zhang Peng, Jiang Yixin, Lin C, et al. Padding for orthogonality:efficient subspace authentication for network coding[C] //Proc of International Conference on Computer Communications. [S. l. ] :IEEE Press, 2011:1026-1034.
[14] 刘济恺. 防污染的安全网络编码研究[D] . 成都:西南交通大学, 2014.
[15] Jaggi S, Langberg M, Katti M, et al. Resilient network coding in the presence of Byzantine adversaries[C] //Proc of International Confe-rence on Computer Communications. 2007.
[16] Liu Guangjun, Wang Bin. Secure network coding against intra/inter-generation pollution attacks[J] . China Communications, 2013, 10(8):100-110.
[17] Kalantrai A, Zheng Gan, Gao Zhen, et al. Security analysis on network coding in bidirectional multibeam satellite communications[J] . IEEE Trans on Information Forensics Security, 2015, 10(9):1862-1874.
[18] Eafahani A, Grorgios M, Jonatjan R, et al. An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks[J] . International Journal of Information Security, 2016, 9(10):1-13.
收稿日期 2016/11/28
修回日期 2017/1/13
页码 879-883
中图分类号 TP393
文献标志码 A