基于置信度傳播的網(wǎng)絡編碼安全方法的研究
[Abstract]:Network coding is a new form of network transmission. It provides the possibility that the network throughput can reach the maximum theoretical value. It can also effectively reduce the energy consumption of network data transmission and improve the reliability of data transmission in the network. In the network coding method, after the forward node receives the data packet, it will cache and encode the new data packet, and then forward the data packet to the downstream node. Because of the inherent characteristics of network coding, the system with network coding is vulnerable to pollution attack. The existing mechanism to deal with pollution attack will cause large computational overhead and weaken the role of network coding. Therefore, a security scheme based on confidence propagation is proposed. In this paper, the security of network coding is studied as follows. (1) the research background of secure network coding is introduced, and the main forms of pollution attack and its harm to network coding system are analyzed. In this paper, the process of constructing hash collision based on birthday paradox, the security scheme based on confidence propagation and the existing problems are discussed. (2) an improved scheme is proposed to overcome the shortcomings of the security scheme based on confidence propagation. In the improved scheme, the intermediate node filters the contaminated data according to the confidence value of the forward node. At the same time, by changing the connection mode between the confidence node and the middle node into a mesh connection, the coverage of the network area is expanded, and the flexibility of the security scheme in practical application is improved. The delay forwarding algorithm based on logarithmic function is used to divide the interval of confidence value, and the forwarding probability is selected according to the interval corresponding to the confidence value. If it is not forwarded, the delay time is calculated and the forwarding probability is adjusted until the packet is forwarded. By delaying the forwarding of low confidence packet, the algorithm can restrain the transmission of contaminated data and improve the network throughput. Based on this, an improved routing protocol based on DSDV is proposed. By writing the confidence information into the routing update packet of the DSDV protocol, the forward node obtains its confidence value in the downstream node through the packet. When the node forwards the data, it selects the appropriate routing path according to its confidence value, and then accelerates the forwarding of trusted packets and blocks the untrusted packets. The purpose of improving network throughput is to improve the performance and execution efficiency of the security scheme by introducing a fast signature algorithm based on homomorphic hash function. In the security scheme based on confidence propagation, the confidence node verifies the digital signature to determine whether the data packet is contaminated or not. Therefore, by using a signature algorithm with lower computational complexity than the original scheme, the computational delay of the confidence node in executing the signature scheme based on the algorithm can be reduced, and the overall efficiency of the security scheme can be improved. By effectively improving the speed and efficiency of testing contaminated data by confidence nodes in network regions, the convergence speed of confidence degree of intermediate nodes affected by contaminated data in safety schemes is accelerated, and the filtering of contaminated data is achieved more quickly and effectively. The purpose of improving the throughput of effective data and reducing the network delay in data transmission.
【學位授予單位】:遼寧大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP393.08
【共引文獻】
相關期刊論文 前6條
1 張祥麗;;一種基于指紋識別的云安全登錄系統(tǒng)設計[J];電視技術(shù);2013年13期
2 陳春良;陳新;;密集節(jié)點區(qū)域的自組織網(wǎng)絡路由算法研究[J];單片機與嵌入式系統(tǒng)應用;2014年10期
3 裴恒利;尚濤;劉建偉;;融合時間戳和同態(tài)簽名的安全網(wǎng)絡編碼方法[J];通信學報;2013年04期
4 屈天剛;;網(wǎng)絡編碼在戰(zhàn)術(shù)數(shù)據(jù)鏈中的應用[J];通信技術(shù);2013年05期
5 潘魯遠;周亞建;郭玉翠;徐國愛;;基于網(wǎng)絡編碼的ARQ機制在WiFi單播中的應用[J];北京電子科技學院學報;2013年04期
6 尚濤;裴恒利;劉建偉;;基于格簽名的安全網(wǎng)絡編碼(英文)[J];中國通信;2014年01期
相關會議論文 前1條
1 陳海勇;朱詩兵;童菲;;基于網(wǎng)絡編碼的軍事物聯(lián)網(wǎng)防竊聽研究[A];2011年全國電子信息技術(shù)與應用學術(shù)會議論文集[C];2011年
相關博士學位論文 前3條
1 劉光軍;安全網(wǎng)絡編碼及其應用[D];西安電子科技大學;2013年
2 李博;物理層網(wǎng)絡編碼及其在非對稱雙向中繼通信中的性能研究[D];哈爾濱工業(yè)大學;2013年
3 梁滿;網(wǎng)絡編碼污染攻擊的防御技術(shù)研究[D];復旦大學;2013年
,本文編號:2140390
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2140390.html