Font Size: a A A

Research On Secure Network Coding Algorithms Against Pollution Attacks

Posted on:2018-08-19Degree:MasterType:Thesis
Country:ChinaCandidate:P C LvFull Text:PDF
GTID:2348330569486240Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Network coding technology allows nodes to participate in the encoding and decoding processing,the use of intermediate nodes to encode and compress the data,you can make the multicast network information transmission capacity to achieve the maximum flow and smallest cut on the theoretical boundaries,Thereby improving network throughput and improving channel load balancing.However,the security problem in the real network environment seriously restricts the development of network coding technology.As the intermediate nodes participate in the data coding and decoding operation,the attacker can tamper with the contents of a small number of packets to produce pollution packets,which may pollute the whole network legitimate packets,resulting in the destination node can not be decoded to get the correct original message.The study of security network coding technology is the network coding can be applied to the reality of the premise of the network and guarantee.The study mainly focuses on the research background and advantages of network coding technology,the characteristics of pollution attack and the research status and typical transmission scheme of security network coding,taking the security network coding research as the core.Two security network coding schemes are proposed,which are based on the research of secure network coding.Improve the security and throughput of network coding and other aspects of performance.The concrete work of the paper is as follows:Firstly,in order to solve the problem that ASNC intermediate node verifies all the encoded packets wasting the network resources and the slow decoding rate of the destination node,an efficient and adaptive network coding transmission scheme which called EANC(Efficient and Adaptive Network Coding transmission scheme against pollution attacks)was proposed.In the EANC scheme,two improvement mechanisms are proposed: one is the adaptive network coding verification mechanism,the intermediate node adjusts the authentication step according to the pollution degree of the current network to improve the verification efficiency of the intermediate node;The other is based on the destination node decoding retransmission recovery mechanism,the destination node to improve the speed of decoding by retransmission recovery.Secondly,the KEPTE algorithm easily is susceptible to inter-generation pollution attacks,and leads to the crosstalk of the message,the complexity of the algorithm and the complexity of the secret key distribution process.TESNC(a Tag Encoding based on Secure Network Coding transmission scheme against pollution attacks)was proposed.The TESNC scheme solves the inter-generational pollution attack and enhances the signature security at the source node signature stage.Adding the validation value verifies and simplifies the verification algorithm and improves the verification efficiency.In addition,the source node distributes the secret key and reduces the network Load to improve average end-to-end delay and verification success rate.Finally,the paper summarizes the whole paper,and prospects the application of network coding in network security,and gives the direction of the next research work.
Keywords/Search Tags:network coding, pollution attacks, information security, adaptive verification, tag encoding
PDF Full Text Request
Related items