Font Size: a A A

Research On Secure Network Coding Method Based On Trust Propagation

Posted on:2015-03-16Degree:MasterType:Thesis
Country:ChinaCandidate:H B SunFull Text:PDF
GTID:2298330431486346Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Network coding is a new paradigm that providespossibility to maximize network throughput, decrease power consumption, and increase reliability.Forwarder nodes innetwork coding system receive input packets and mix them togenerate output packets.Because of mixing nature of networkcoding packets,these systems are vulnerable to pollution attacksin which attacker can inject polluted packets into the network orcorrupt input packets to generate polluted output packets.Existing mechanismsaddressing pollution attacks either have high computationaloverhead which decreases network coding performance or needan extra secure channel. Because of that reason, in this paper, we propose a Trust-Propagation-based secure scheme to identify and filter pollution attacks.The main researched works about secure network codingin this paper are as follows:(1) First, we introduce the basic theory about secure network coding, and analysis the main principles of the pollution attack as well as the damage for network coding caused by it. Secondly, we discuss themethod which how to construct hash collisions base birthday paradox, the Trust-Propagation-Based Scheme and its defects comprehensively.(2) Considering the defects of the Trust-Propagation-Based Scheme, we propose an improved scheme. In that scheme, network nodes in each region filter corrupted packet by the trust about upstream sender node. Meanwhile, it expand the coverage and improve the flexibility of the scheme in real working environment by connect nodes and trust node direct in our scheme. We present aLogarithmic-Function-Based Forward Delay Algorithm.In this algorithm, we divide the range of trust into different intervals, and choose forward probability by them. If the packet didn’t sendsuccessfully, then it will calculate the delay time and new forward probability until the packet sendsuccessfully. It could decrease the propagation of corrupted packet and increase throughput of the system significantly. Meanwhile, we present the improvedrouting protocol base DSDV. In the protocol, network node get its trust which conserved in downstream nodes by receiverouting update packet. When the network node send packet to downstream node, it will choose the right path by trust. This protocol could raise the sending speed of trust packet and increase throughput of network system.(3) In improved scheme, we improveperformance and increase efficiency by use new hash-function-based fast signaturealgorithm. It detect corrupted packet in network by trust node check packet’s signature in Trust-Propagation-Based Scheme. Because of that, we use signaturealgorithm whichhas lower computational complexity thanthe scheme used before. It can decrease delay time which caused by trust node check the packet’s signature, and make the secure scheme more efficient. It could increase throughput and decrease delay time of the network system, and improve its secure performance by detect corrupted packet and adjust the trust of network node faster.
Keywords/Search Tags:trust propagation, network coding, pollution attack, hash function, fastsignaturealgorithm
PDF Full Text Request
Related items