LIU Jun, LIU Yi'nan, LIU Hui, WANG Yingmei. Network Coding Anti-eavesdropping Algorithm for Ad hoc Networks[J]. Chinese Journal of Electronics, 2015, 24(3): 639-641. doi: 10.1049/cje.2015.07.034
Citation: LIU Jun, LIU Yi'nan, LIU Hui, WANG Yingmei. Network Coding Anti-eavesdropping Algorithm for Ad hoc Networks[J]. Chinese Journal of Electronics, 2015, 24(3): 639-641. doi: 10.1049/cje.2015.07.034

Network Coding Anti-eavesdropping Algorithm for Ad hoc Networks

doi: 10.1049/cje.2015.07.034
Funds:  This work is supported by The National Natural Science Foundation of China (No.61151002, No.60939002), the Fundamental Research Funds for the Central Universities (No.N120404003).
  • Received Date: 2013-12-18
  • Rev Recd Date: 2014-01-15
  • Publish Date: 2015-07-10
  • Aiming at the anti-eavesdrop security demand and potential safety hazard in Ad hoc, a secure random linear network coding algorithm was proposed. The algorithm has secure source coding and protecting the coding vectors. The information source secure coding method and optimizing the finite region is defined to guarantee that the information is properly protected. Different coding vectors protecting schemes were designed for adapting security path and without. We applied the secure random linear network coding algorithm in Ad Hoc Networks to meet the demand on anti-eavesdrop. The anti-eavesdrop algorithm based on network coding is simulated and analyzed in NS2 platform, the results shown that comparing with the encryption algorithm, the anti-eavesdrop algorithm based on network coding has better performance in end-to-end delay and encryption speed.
  • loading
  • N. Cai, R.W. Yeung, "Secure network coding", Proceeding of 2002 IEEE International Symposium, pp.323-333, 2002.
    J. Feldman, T. Malkin, C. Stein, et al., "On the capacity of secure network coding", 42nd Annual Allerton Conference on Communication, Control and Computing, pp.666-671,2004.
    T. Ho, B. Leong, R. Koetter, et al., "Byzantine modification detection in multicast networks with random network coding", IEEE Transactions on Information Theory, Vol.54, No.6, pp.2798-2803, 2008.
    N. Cai, R.W. Yeung, "A security condition for multi-source linear network coding", IEEE International Symposium on Information Theory, pp.561-565, 2007.
    R.W. Yeung, N. Cai, "On the optimality of a construction of secure network codes", IEEE International Symposium on Information Theory, pp.166-170, 2008.
    D. Silva, F.R. Kschischang, "Security for wiretap networks via rank-metric codes", IEEE International Symposium on Information Theory, pp.176-180, 2008.
    K. Bhattad, K.R. Narayanan, "Weakly secure network coding", NetCod, Vol.4, No.2, pp.199-209, 2005.
    Hengli Pei, Tao Shang, Jianwei Liu, "Secure network coding method merged with timestamp and homomorphic signature", Journal on Communications, Vol.4, pp.28-35, 2013.
    Guangxian Xu, Xiao Fu, "Low complexity secure network coding algorithm based on sparse matrix", Computer Engineering, Vol.38, No.9, pp.13-19, 2012.
    Lianxiang Zhu, et al., "Research on network security route and secure network coding in wiretapping", Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), Vol.24, No.1, pp.25-37, 2012.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (246) PDF downloads(804) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return