高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一种安全的纠错网络编码

周业军 李晖 马建峰

周业军, 李晖, 马建峰. 一种安全的纠错网络编码[J]. 电子与信息学报, 2009, 31(9): 2237-2241. doi: 10.3724/SP.J.1146.2008.01237
引用本文: 周业军, 李晖, 马建峰. 一种安全的纠错网络编码[J]. 电子与信息学报, 2009, 31(9): 2237-2241. doi: 10.3724/SP.J.1146.2008.01237
Zhou Ye-jun, Li Hui, Ma Jian-feng. Secure Error-Correction Network Coding[J]. Journal of Electronics & Information Technology, 2009, 31(9): 2237-2241. doi: 10.3724/SP.J.1146.2008.01237
Citation: Zhou Ye-jun, Li Hui, Ma Jian-feng. Secure Error-Correction Network Coding[J]. Journal of Electronics & Information Technology, 2009, 31(9): 2237-2241. doi: 10.3724/SP.J.1146.2008.01237

一种安全的纠错网络编码

doi: 10.3724/SP.J.1146.2008.01237
基金项目: 

国家自然科学基金(60772136,60633020),国家863计划项目(2007AA01Z435,2007AA01Z429) 和广西信息与通讯技术重点实验室资助课题

Secure Error-Correction Network Coding

  • 摘要: 该文利用消息空间的所有子空间上的一种度量,给出了一种安全的纠错网络编码。首先,此度量下的最小距离译码法可以纠正一定维数的错误。另外,在此编码方法下,当攻击者能窃听到的信道数目小于网络的最大流时,攻击者得不到关于信源的任何信息。最后,当攻击者能窃听网络中所有信道时,本文通过让信源和信宿共享一个随机数生成器和一个秘钥,进一步给出了能防此类强攻击者的安全纠错网络编码。
  • Ahlswede R, Cai N, and Li S Y, et al.. Network informationflow [J].IEEE Transactions on Information Theory.2000,46(4):1204-1216[2]Li S Y, Yeung R W, and Cai N. Linear network coding [J].IEEE Transactions on Information Theory.2003, 49(2):371-381[3]Ho T, Koetter R, and Medard M, et al.. The benefits ofcoding over routing in a randomized setting [C]. IEEEInternational Symposium on Information Theory, YokohamaJapan, 2003: 442.[4]Geil1 O, Matsumoto R, and Thomsen1 C. On field size andsuccess probability in network coding [C][J].Lecture Notes inComputer Science.2008, 5130:157-173[5]武广柱, 王劲林, 齐卫宁. ARLNC Stream: 自适应随机网络编码流媒体系统[J].电子与信息学报.2008, 30(1):25-28浏览[6]Cai N and Yeung R W. Secure network coding [C]. IEEEInternational Symposium on Information Theory, Lausanne,Switzerland, 2002:323.[7]Feldman J, Malkin T, and Stein C, et al.. On the capacity ofsecure network coding [C]. In Proc. 42nd Annual AllertonConference on Communication, Control, and Computing,Monticello, IL, USA, Sep. 2004.[8]Chanl T and Grant A. Capacity bounds for secure networkcoding [C]. Communication theory workshop, Australian,2008: 95-100.[9]Bhattad K and Narayanan K R. Weakly secure networkcoding [C]. In Proc. of the First Workshop on NetworkCoding, Theory, and Applications (NetCod), Riva del, Garda,Italy, 2005.[10]Jain K. Security based on network topology against thewiretapping attack [J].IEEE Wireless Communications.2004, 11(1):68-71[11]Lima L, Medard M, and Barros J. Random linear networkcoding: A free cipher? [C]. IEEE International Symposium onInformation Theory, Nice, France, 2007: 546-550.[12]Ho T, Leong B, and Koetter R, et al.. Byzantine modificationdetection in multicast networks using randomized networkcoding [C]. IEEE International Symposium on InformationTheory, Chicago, USA, 2004: 144.[13]Jaggi S, Langberg M, and Katti S, et al.. Resilient networkcoding in the presence of Byzantine adversaries [C]. 26thIEEE International Conference on ComputerCommunications, Anchorage, Alaska, 2007: 616-624.[14]Nutman L and Langberg M. Adversarial models and resilientschemes for network coding [C]. IEEE InternationalSymposium on Information Theory, Toronto, Ontario,Canada, 2008: 171-175.Yu Zhen, Wei Ya-wen, Ramkumar B, and Guan Yong. Anefficient signature-based scheme for securing network codingagainst pollution attacks [C]. Proc 27th Annual IEEEConference on Computer Communication, INFOCOM,(Anchorage, AK), 2008: 1409-1417.[15]Cai N and Yeung R W. Network coding and error correction[C]. IEEE Information Theory Workshop, Bangalore, India,2002: 119-122.[16]Yeung R W and Cai N. Network error correction, part I:basic concepts and upper bounds [J]. Communications inInformation and Systems, 2006, 6(1): 19-36.[17]Cai N and Yeung R W. Network error correction, part II:lower bounds [J]. Communications in Information andSystems, 2006, 6(1): 37-54.[18]Yang Sheng-hao and Yeung R W. Refined coding bounds fornetwork error correction [C]. IEEE Information TheoryWorkshop, Bergen, Norway, 2007: 1-5.Yang Sheng-hao, Ngai C K, and Yeung R W. Construction oflinear network codes that achieve a refined singleton bound[C]. IEEE International Symposium on Information Theory,Nice, France 2007: 1576-1580.[19]Zhang Z. Network error correction coding in packetizednetworks [C]. IEEE Information Theory Workshop, ChengduChina, 2006: 433-437.[20]Zhang Z. Linear network error correction codes in packetnetworks [J].IEEE Transactions on Information Theory.2008, 54(1):209-218[21]Yang Sheng-hao and Yeung R W. Characterizations ofnetwork error correction/ detection and erasure correction[C]. In Proc. of the Third Workshop on Network Coding,Theory, and Applications, San Diego, California, 2007.[22]Koetter R and Kschischang F R. Coding for errors anderasures in random network coding [J]. IEEE Transactionson Information Theory, 2008. 2008, 54(8): 3579-3591.[23]Ngai C K and Yang Sheng-hao. Deterministic secureerror-correcting (SEC) network codes [C]. IEEE InformationTheory Workshop, Bergen, Norway, 2007: 96-101.
  • 加载中
计量
  • 文章访问数:  3044
  • HTML全文浏览量:  57
  • PDF下载量:  831
  • 被引次数: 0
出版历程
  • 收稿日期:  2008-10-06
  • 修回日期:  2009-03-17
  • 刊出日期:  2009-09-19

目录

    /

    返回文章
    返回