Font Size: a A A

Research On Secure Network Coding Scheme Based On Encryption Algorithm

Posted on:2022-09-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhouFull Text:PDF
GTID:2518306338978229Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of data communication technology,various forms of communication network have been widely used in people’s lives and work.At the same time,people rely more and more on network applications,and the demand for communication network is also increasing.In the way of information processing and transmission,the network coding technology has brought about great innovation,which is a major breakthrough in the field of information theory research.Although network coding technology has been greatly improved in terms of effectiveness and security,and has been widely used in many fields of communication business,the network security issues can not be ignored.While ensuring the advantages of network coding,how to improve network security according to the actual needs has become a research hotspot.Among them,multi-source network coding technology is widely used,such as multi-source information fusion,multi-source spatial big data.This paper mainly studies the multi-source network coding scheme against eavesdropping and pollution as follows:Firstly,in order to solve the problem that the sink node cannot judge the source of the message and cannot multicast to all sink nodes in the multi-source network coding scheme,a multi-source network coding scheme with multi-sink nodes is proposed.Based on the independence of the source node,the network subgraph is divided,the multicast rate is determined to find the independent path and the path of node overlap,and then the coding node is selected.At the source node,the source identifier is added at the header of the packet,so that the sink node can identify the source node to which the message belongs.JAVA socket is used to simulate channel transmission,and UDP network communication is used to realize node data sending,receiving and coding.Simulation results show that the scheme can successfully encode and decode messages and identify the source of messages,and it is feasible.Secondly,in view of the problem that the the source node limit the multicast rate in the secure network coding scheme,a scheme which based on Logistic chaotic mapping anti-global eavesdropping is proposed.First,the Logistic chaotic sequence undergoes multiple iterations on the initial value vector,and the result vector generated by the iteration is used to construct a precoding matrix.Finally,a large number matrix is generated by the precoding matrix to hide the source message.In order to make the message operate in a finite field,the division operation is carried out,and the remainder matrix is network coded,then the quotient matrix is encrypted,so as to achieve the purpose of fighting eavesdropping.Compared with the traditional against hacking attack scheme,this scheme can achieve against eavesdropping without considering the effect of global eavesdroppers eavesdropping capabilities.Under the premise of the same bandwidth cost,it expands the limited range of the source node multicast rate,which is applicable single-source networks are also suitable for multi-source and multi-sink networks.Theoretical analysis and experimental results show that this scheme can be against global eavesdropping and can successfully encode and decode.Finally,in view of the source-generation pollution attack problem of multi-source network coding,an anti-pollution attack scheme based on the KEPET scheme is proposed.Aiming at the problem that the traditional KEPTE scheme can be not against inter-generational pollution,then the traditional KETEP scheme is improved.By adding the source generation identifier and the corresponding identifier tag to the source node,and adding the source generation identifier verification function to the node,the original static key is converted into a random key to be against inter-generational pollution.Theoretical analysis and experimental results show that the scheme can be effectively against inter-generational pollution,and can successfully encode and decode.
Keywords/Search Tags:multi-source network coding, Logistic chaotic mapping, hacking attacks, KEPTE scheme, intergenerational pollution
PDF Full Text Request
Related items