LIU Jun, YANG Jingyu, CHENG Zijing, WANG Mengyuan. Anti-eavesdropping Network Coding Algorithm Based on T-N Threshold[J]. Chinese Journal of Electronics, 2017, 26(2): 372-376. doi: 10.1049/cje.2017.01.029
Citation: LIU Jun, YANG Jingyu, CHENG Zijing, WANG Mengyuan. Anti-eavesdropping Network Coding Algorithm Based on T-N Threshold[J]. Chinese Journal of Electronics, 2017, 26(2): 372-376. doi: 10.1049/cje.2017.01.029

Anti-eavesdropping Network Coding Algorithm Based on T-N Threshold

doi: 10.1049/cje.2017.01.029
Funds:  This work is supported by the National Natural Science Foundation of China (No.61671141, No.61501038, No.61501038, No.91438177, No.91538202).
  • Received Date: 2014-08-25
  • Rev Recd Date: 2014-09-15
  • Publish Date: 2017-03-10
  • Catering to the public nature of Ad hoc network in open channel and data communication being easily eavesdropped, this paper proposed an anti-eavesdropping algorithm which is based on network coding. The algorithm is based on the RSA signature algorithm introducing the timestamp and homomorphic mechanism to detect tampering and replay attacks, as the basis for calculating safety, being used as one of measurement indicators in router by node safety to establish t pieces of routing entry. It generates encoding vectors by introducing the random number when the source node is encoded and the random number will be divided into n pieces. As long as the sink node receives t pieces of fragments, we can restore the original encoding vector and decode it. If the eavesdropper wiretaps are less than t, they can not get any meaningful information. It is designed for increasing the number of linearly independent coded packets.It can improve the decoding efficiency by adopting generational grouping strategy while being encoded. Simulation and theoretical analysis shows that the anti-eavesdropping algorithm based on network coding improves network performance and security by coding gain.
  • loading
  • N. Cai and R.W. Yeung, "Secure network coding", IEEE Intl. Symp. Inf. Theory. Lausanne, Switzerland, Press, pp.323, 2012.
    N. Cai and R.W. Yeung, "Secure network coding on a wiretap network", IEEE Trans on Inform. Theory, Vol.57, No.1, pp.424-435, 2011.
    L.X. Zhu, Y.Y. Zhu and Z. Cao, "Research of network safety path and secure network coding under wiretapping", Journal Of Chongqing University Of Posts And Telecommunications Natural Science Edition, Vol.24, No.1, pp.39-44, 2012.
    Y.J. Zhou, H. LI, J.F. Ma, "Random network coding against the eavesdropping adversaries", Journal Of Xidian University, Vol.36, No.4, pp.696-701, 2009.
    M.X. Luo, Y.X. Yang, L.C. Wang and X.X. Niu, "The secure network coding against the wiretapping attack", Scientia Sinica Informations, Vol.40, No.2, pp.371-380, 2010.
    M.N. Krohn, M.J. Freedman and D. Mazieres, "On-the-fly verification of rateless erasure codesfor efficient content distribution", IEEE Symposium on Security and Privacy, Oakland, CA, pp.226-240, 2004.
    Y.J. Zhou, H. LI and J.F. Ma, "Secure network coding against the contamination and eavesdropping adversaries", Chinese Journal of Electronics, Vol.18, No.3, pp.411-416, 2009.
    Subhash Lakshminarayana, Atilla Eryilmaz, "Multirate multicasting with intralayer network coding", IEEE/ACM Transactions on Networking (TON), Vol.21, No.4, pp.1256-1269, 2013.
    Z.H. Cao, X.D. Ji and M. Liu, "The application of network coding in eavesdropping network", Computer Science, Vol.42, No.2, pp.261-263, 2013.
    Christina Fragouli, Jorg Widmer and Jean-Yves Le Boudec, "Efficient broadcasting using network coding", IEEE/ACM Transactions on Networking (TON), Vol.16, No.2, pp.450-463, 2014.
    Y.X. Jiang, H.J. Zhu, M.H. Shi, X.M. Shen and C. Lin, "An efficient dynamic-identity based signature scheme for secure network coding", Computer Networks, Vol.54, No.1, pp.28-40, 2012.
    R. Gennaro, J. Katz and H. Krawczyk, T. Rabiv, "Secure network coding over the integers", Public Key Cryp-tography, pp.142-160, 2014.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (134) PDF downloads(363) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return