基于置信度傳播的網(wǎng)絡(luò)編碼安全方法的研究
[Abstract]:Network coding is a new form of network transmission. It provides the possibility that the network throughput can reach the maximum theoretical value. It can also effectively reduce the energy consumption of network data transmission and improve the reliability of data transmission in the network. In the network coding method, after the forward node receives the data packet, it will cache and encode the new data packet, and then forward the data packet to the downstream node. Because of the inherent characteristics of network coding, the system with network coding is vulnerable to pollution attack. The existing mechanism to deal with pollution attack will cause large computational overhead and weaken the role of network coding. Therefore, a security scheme based on confidence propagation is proposed. In this paper, the security of network coding is studied as follows. (1) the research background of secure network coding is introduced, and the main forms of pollution attack and its harm to network coding system are analyzed. In this paper, the process of constructing hash collision based on birthday paradox, the security scheme based on confidence propagation and the existing problems are discussed. (2) an improved scheme is proposed to overcome the shortcomings of the security scheme based on confidence propagation. In the improved scheme, the intermediate node filters the contaminated data according to the confidence value of the forward node. At the same time, by changing the connection mode between the confidence node and the middle node into a mesh connection, the coverage of the network area is expanded, and the flexibility of the security scheme in practical application is improved. The delay forwarding algorithm based on logarithmic function is used to divide the interval of confidence value, and the forwarding probability is selected according to the interval corresponding to the confidence value. If it is not forwarded, the delay time is calculated and the forwarding probability is adjusted until the packet is forwarded. By delaying the forwarding of low confidence packet, the algorithm can restrain the transmission of contaminated data and improve the network throughput. Based on this, an improved routing protocol based on DSDV is proposed. By writing the confidence information into the routing update packet of the DSDV protocol, the forward node obtains its confidence value in the downstream node through the packet. When the node forwards the data, it selects the appropriate routing path according to its confidence value, and then accelerates the forwarding of trusted packets and blocks the untrusted packets. The purpose of improving network throughput is to improve the performance and execution efficiency of the security scheme by introducing a fast signature algorithm based on homomorphic hash function. In the security scheme based on confidence propagation, the confidence node verifies the digital signature to determine whether the data packet is contaminated or not. Therefore, by using a signature algorithm with lower computational complexity than the original scheme, the computational delay of the confidence node in executing the signature scheme based on the algorithm can be reduced, and the overall efficiency of the security scheme can be improved. By effectively improving the speed and efficiency of testing contaminated data by confidence nodes in network regions, the convergence speed of confidence degree of intermediate nodes affected by contaminated data in safety schemes is accelerated, and the filtering of contaminated data is achieved more quickly and effectively. The purpose of improving the throughput of effective data and reducing the network delay in data transmission.
【學(xué)位授予單位】:遼寧大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
【共引文獻(xiàn)】
相關(guān)期刊論文 前6條
1 張祥麗;;一種基于指紋識(shí)別的云安全登錄系統(tǒng)設(shè)計(jì)[J];電視技術(shù);2013年13期
2 陳春良;陳新;;密集節(jié)點(diǎn)區(qū)域的自組織網(wǎng)絡(luò)路由算法研究[J];單片機(jī)與嵌入式系統(tǒng)應(yīng)用;2014年10期
3 裴恒利;尚濤;劉建偉;;融合時(shí)間戳和同態(tài)簽名的安全網(wǎng)絡(luò)編碼方法[J];通信學(xué)報(bào);2013年04期
4 屈天剛;;網(wǎng)絡(luò)編碼在戰(zhàn)術(shù)數(shù)據(jù)鏈中的應(yīng)用[J];通信技術(shù);2013年05期
5 潘魯遠(yuǎn);周亞建;郭玉翠;徐國(guó)愛;;基于網(wǎng)絡(luò)編碼的ARQ機(jī)制在WiFi單播中的應(yīng)用[J];北京電子科技學(xué)院學(xué)報(bào);2013年04期
6 尚濤;裴恒利;劉建偉;;基于格簽名的安全網(wǎng)絡(luò)編碼(英文)[J];中國(guó)通信;2014年01期
相關(guān)會(huì)議論文 前1條
1 陳海勇;朱詩(shī)兵;童菲;;基于網(wǎng)絡(luò)編碼的軍事物聯(lián)網(wǎng)防竊聽研究[A];2011年全國(guó)電子信息技術(shù)與應(yīng)用學(xué)術(shù)會(huì)議論文集[C];2011年
相關(guān)博士學(xué)位論文 前3條
1 劉光軍;安全網(wǎng)絡(luò)編碼及其應(yīng)用[D];西安電子科技大學(xué);2013年
2 李博;物理層網(wǎng)絡(luò)編碼及其在非對(duì)稱雙向中繼通信中的性能研究[D];哈爾濱工業(yè)大學(xué);2013年
3 梁滿;網(wǎng)絡(luò)編碼污染攻擊的防御技術(shù)研究[D];復(fù)旦大學(xué);2013年
,本文編號(hào):2140390
本文鏈接:http://www.sikaile.net/guanlilunwen/ydhl/2140390.html