[1]王海鹏,梅中辉. 一种基于安全网络编码技术的抗污染攻击机制[J].计算机技术与发展,2016,26(07):94-99.
 WANG Hai-peng,MEI Zhong-hui. A Scheme against Pollution Attacks Based on Secure Network Coding[J].,2016,26(07):94-99.
点击复制

 一种基于安全网络编码技术的抗污染攻击机制()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年07期
页码:
94-99
栏目:
安全与防范
出版日期:
2016-07-10

文章信息/Info

Title:
 A Scheme against Pollution Attacks Based on Secure Network Coding
文章编号:
1673-629X(2016)07-0094-06
作者:
 王海鹏梅中辉
 南京邮电大学 通信与信息工程学院
Author(s):
 WANG Hai-pengMEI Zhong-hui
关键词:
 安全网络编码污染攻击自适应验证同态
Keywords:
 secure network codingpollution attackadaptive verificationhomomorphic
分类号:
TP301
文献标志码:
A
摘要:
 文中主要研究在安全网络编码技术中的抗污染问题。由于网络编码会在中间节点生成新的数据包,所以只要注入少量污染数据包就会造成污染扩张,从而造成网络性能下降。所以有必要在中间节点验证网络中是否发生污染攻击,但同时又要减少检验所带来的时间延迟。文中提出一种自适应抗污染攻击机制。该机制可以针对污染攻击严重情况来自适应调节中间节点的检测步骤,同时提高了运算效率并降低了验证时延。仿真结果表明,理论结果和实际计算吻合,自适应验证机制的时延相比传统验证机制较小。
Abstract:
 It mainly deals with pollution attacks in secure network coding in this paper. The new packet will be produced in the intermedi-ate nodes by employing network coding,so a small amount of pollution data packet could cause pollution expansion,which results in sub-stantially degraded performance for the network. Therefore,it is necessary to verify whether the intermediate nodes are in the pollution at-tack or not,and at the same time to reduce the time delay caused by security detection. An adaptive mechanism that can dynamically ad-just the authentication strategy of intermediate nodes is proposed so as to improve operational efficiency and decrease the time delay brought by verification. Simulation shows that theoretical results are in accordance with actual calculation,and the time delay of the adap-tive mechanism is less than that of traditional verification mechanism.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(07):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(07):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(07):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(07):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(07):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(07):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(07):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(07):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(07):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(07):47.

更新日期/Last Update: 2016-09-28