期刊文献+

抗污染攻击的移动P2P数据安全分发系统 被引量:1

Secure Data Distribution System Against Pollution Attacks on Mobile Peer-to-Peer Network
在线阅读 下载PDF
导出
摘要 采用网络编码方法,给出一个改进的抗污染攻击的安全签名机制,使得签名的私钥能随着传输数据包的改变而改变,运用该安全签名机制设计开发一个移动P2P数据分发原型系统S-SymTorrent.S-SymTorrent以抗污染攻击签名机制作为其数据传输的安全控制策略,不仅获得了较高的传输率,而且确保数据分发的安全性. An efficient secure signature scheme against pollution attacks is improved by network coding, which the private key for its signature can be updated along with the change of transmission packet. A system prototype for secure data distribution on mobile peer to peer network, called S-SymTorrent, is designed and implemented by the given improved secure signature scheme. S-SymTorrent system can transform efficiently the data by the signature scheme against pollution attack, and it can guarantee reliable data distribution.
出处 《微电子学与计算机》 CSCD 北大核心 2012年第9期160-163,共4页 Microelectronics & Computer
基金 广西自然科学基金项目(2011GXNSFA018152)
关键词 安全数据分发 移动P2P网络 网络编码 污染攻击 签名机制 secure data distributiom mobile P2P network network coding pollution attack signature scheme
作者简介 杨柳 女,(1970-),硕士,讲师.研究方向为网络信息安全、P2P技术 钟诚 男,(1964-),博士,教授,博士生导师.研究方向为网络信息安全、并行分布计算
  • 相关文献

参考文献8

  • 1杨柳,钟诚,陆向艳.基于P2P网络的分布式聚类算法研究分析[J].微电子学与计算机,2009,26(8):83-85. 被引量:2
  • 2Rafit Izhak-Ratzin. Collaboration in bittorrent systems [C] // Proceedings of NETWORKING 2009, LNCS, 2009, 55(5):338-351.
  • 3Mohammed Hawa, Jamal S Rahhal, Dia I Abu-Al-Na di. File size models for shared content over the BitTor rent Peer-to-Peer network[J]. Peer-to-Peer Networ king and Applications, 2012, 5(3): 279-291.
  • 4Fitzek H P, Hassan Charaf. Mobile peer-to-peer (P2P) a tutorial guide[M]. Chennai, India: Laser- words Private Limited, 2009: 103-142.
  • 5Fragouli C , Boudec J Y L, Widmer J. Network cod- ing : an instant primer[J]. SIGCOMM Computer Com- munication,2006, 36(1) : 63-68.
  • 6Shweta Agrawal, Dan Boneh, Xavier Boyen, et al. Preventing pollution attacks in multi-source network coding[J]. Public Key Cryptography, LNCS, 2010,56 (6) : 161-176.
  • 7Jiang Y, Fan Y, Shen A X, et al. A self-adaptive prohabilistic packet filter scheme against entropy at-tacks in network coding[J]. Computer Networks, 2009, 53(18): 3089-3101.
  • 8杨铭熙,严文杰.一次一密的网络编码签名算法[J].武汉理工大学学报,2009,31(3):73-76. 被引量:2

二级参考文献13

  • 1Petrovic D, Ramchandran K, Rabaey J. Overcoming Untuned Radios in Wireless Networks with Network Coding[A]. In IEEE Transactions on Information Theory[ C]. 2006,25 (6) : 2649-2657.
  • 2Gkantsidis C, Rodriguez P. Network Coding for Large Scale File Distribution. in Proc. IEEE INFOCOM[C], 2005,23(7) : 157-256.
  • 3Ahlswede R, Cai N, Li S, et al. Network Information flow. IEEE Trans. Inf. Theory[C], 2000,46(4) :1204-1216.
  • 4Ho T, Koetter R, M'edard M, et al. The Benefits of Coding Over Routing in a Randomized Setting. in International Symposium on Information Theory (ISIT) [C], 2003,13(9) :55-73.
  • 5Ho T, M'edard M, Shi J, et al. On Randomized Network Coding. In Proc. 41st Annual Allerton Conference on Communication Control and Computing[C], 2003,19 (7) : 88-97.
  • 6Krohn M N, Freedman M J, Mazi'eres D. On-the-fly Verification of Rateless Erasure Codes for Efficient Content Distribution. IEEE Symp. Security and Privacy, Oak-land, CA, pp[A], 2004(5) :226-240.
  • 7Zhen Yu, YaWEN Wei, Bhuvaneswari Ramkumar, et al. An Efficient Signature-based Scheme for Securing Network Coding against Pollution Attacks INFOCOM 2008. The 27th Conference on Computer Communications. IEEE[C], 2008,4 (10) : 66- 68.
  • 8Charles D, Jian K, Lauter K. Signature for Network Coding. Technique Report MSR-TR-2005-159, Microsoft[C], 2005,7 (13) : 153-158.
  • 9Menezes A, Okamoto T, Vanstone S. Reducing Elliptic Curve Logorithms to Logorithms in a Finite Field. in IEEE Transactions on Information Theory[C], 1993,39(5) : 1639-1646.
  • 10Miller V. Short Programs for Functions Over Curve. Unpublished Manuscript, http://crypto.stanford.edu/miller/miller. pdf, 1986,9(12) :75-78.

共引文献2

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部