LIU Jun, LIU Yi'nan, LIU Hui, WANG Yingmei. Network Coding Anti-eavesdropping Algorithm for Ad hoc Networks[J]. Chinese Journal of Electronics, 2015, 24(3): 639-641. DOI: 10.1049/cje.2015.07.034
Citation: LIU Jun, LIU Yi'nan, LIU Hui, WANG Yingmei. Network Coding Anti-eavesdropping Algorithm for Ad hoc Networks[J]. Chinese Journal of Electronics, 2015, 24(3): 639-641. DOI: 10.1049/cje.2015.07.034

Network Coding Anti-eavesdropping Algorithm for Ad hoc Networks

Funds: This work is supported by The National Natural Science Foundation of China (No.61151002, No.60939002), the Fundamental Research Funds for the Central Universities (No.N120404003).
More Information
  • Received Date: December 17, 2013
  • Revised Date: January 14, 2014
  • Published Date: July 09, 2015
  • Aiming at the anti-eavesdrop security demand and potential safety hazard in Ad hoc, a secure random linear network coding algorithm was proposed. The algorithm has secure source coding and protecting the coding vectors. The information source secure coding method and optimizing the finite region is defined to guarantee that the information is properly protected. Different coding vectors protecting schemes were designed for adapting security path and without. We applied the secure random linear network coding algorithm in Ad Hoc Networks to meet the demand on anti-eavesdrop. The anti-eavesdrop algorithm based on network coding is simulated and analyzed in NS2 platform, the results shown that comparing with the encryption algorithm, the anti-eavesdrop algorithm based on network coding has better performance in end-to-end delay and encryption speed.
  • N. Cai, R.W. Yeung, "Secure network coding", Proceeding of 2002 IEEE International Symposium, pp.323-333, 2002.
    J. Feldman, T. Malkin, C. Stein, et al., "On the capacity of secure network coding", 42nd Annual Allerton Conference on Communication, Control and Computing, pp.666-671,2004.
    T. Ho, B. Leong, R. Koetter, et al., "Byzantine modification detection in multicast networks with random network coding", IEEE Transactions on Information Theory, Vol.54, No.6, pp.2798-2803, 2008.
    N. Cai, R.W. Yeung, "A security condition for multi-source linear network coding", IEEE International Symposium on Information Theory, pp.561-565, 2007.
    R.W. Yeung, N. Cai, "On the optimality of a construction of secure network codes", IEEE International Symposium on Information Theory, pp.166-170, 2008.
    D. Silva, F.R. Kschischang, "Security for wiretap networks via rank-metric codes", IEEE International Symposium on Information Theory, pp.176-180, 2008.
    K. Bhattad, K.R. Narayanan, "Weakly secure network coding", NetCod, Vol.4, No.2, pp.199-209, 2005.
    Hengli Pei, Tao Shang, Jianwei Liu, "Secure network coding method merged with timestamp and homomorphic signature", Journal on Communications, Vol.4, pp.28-35, 2013.
    Guangxian Xu, Xiao Fu, "Low complexity secure network coding algorithm based on sparse matrix", Computer Engineering, Vol.38, No.9, pp.13-19, 2012.
    Lianxiang Zhu, et al., "Research on network security route and secure network coding in wiretapping", Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), Vol.24, No.1, pp.25-37, 2012.
  • Related Articles

    [1]PENG Yuhuai, DENG Qingxu, GUO Lei, WANG Fanzhao. A New Network Coding Based Routing Protocol for Enhancing Throughput Capacity in Wireless Mesh Networks[J]. Chinese Journal of Electronics, 2019, 28(2): 416-422. DOI: 10.1049/cje.2019.01.015
    [2]NING Zuoting, ZHANG Dafang, LIU Xuchong. A Novel Approach of Network Coding in Wireless Networks Overhearing[J]. Chinese Journal of Electronics, 2018, 27(6): 1297-1304. DOI: 10.1049/cje.2018.06.010
    [3]LIU Guangjun, XIAO Song. Scalable Security Solution Against Wiretapping for Network Coding Based Priority Encoding Transmission[J]. Chinese Journal of Electronics, 2018, 27(1): 191-197. DOI: 10.1049/cje.2017.09.017
    [4]LIU Jun, YANG Jingyu, CHENG Zijing, WANG Mengyuan. Anti-eavesdropping Network Coding Algorithm Based on T-N Threshold[J]. Chinese Journal of Electronics, 2017, 26(2): 372-376. DOI: 10.1049/cje.2017.01.029
    [5]WANG Gang, LENG Jie, YUAN Cangzhou. Repeated Inter-Session Network Coding Games with an Average Cost Share Pricing Mechanism in Congested Networks[J]. Chinese Journal of Electronics, 2015, 24(2): 398-401. DOI: 10.1049/cje.2015.04.029
    [6]SHANG Tao, FAN Yong, WANG Chao, LIU Jianwei. Performance Analysis of Wireless Network Coding via Percolation[J]. Chinese Journal of Electronics, 2014, 23(1): 179-185.
    [7]XIAO Song, WANG Hui, WU Chengke. A New Network Coding Design for Reliable Video Multicast[J]. Chinese Journal of Electronics, 2011, 20(2): 361-364.
    [8]GUANG Xuan, FU Fangwei. On Random Linear Network Coding for Butterfly Network[J]. Chinese Journal of Electronics, 2011, 20(2): 283-286.
    [9]DU Bing and ZHANG Jun. Parity Check Network Coding for WirelessCooperative Communications[J]. Chinese Journal of Electronics, 2010, 19(2): 339-344.
    [10]ZHOU Yejun, LI Hui, MA Jianfeng. Secure Network Coding Against the Contamination and Eavesdropping Adversaries[J]. Chinese Journal of Electronics, 2009, 18(3): 411-416.

Catalog

    Article Metrics

    Article views (619) PDF downloads (806) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return