期刊文献+

网络编码中抗污染攻击研究 被引量:1

Survey on anti-pollution attack in network coding
在线阅读 下载PDF
导出
摘要 网络编码能够达到网络的最大理论容量,由于中间节点的可编码性,使得恶意节点有更多的机会对网络进行污染攻击,扩大了污染信息在网络中蔓延的程度,最终导致网络瘫痪。简要介绍了网络编码和污染攻击的概念,针对网络中采用了网络编码的抵抗污染攻击的研究方案进行了论述,并分别从3个不同的角度对已有研究成果进行了对比和分析。最后,讨论了网络编码中污染攻击研究仍存在的问题,提出了对未来的展望。 Network coding can improve the network performance significantly. However, as intermediate nodes can code together the packets they receive, the polluted information can spread to the whole network more rapidly leading to paralysis of the whole network. Thus, networks involving network coding are vulnerable to the pollution attack. Network coding and pollution attacks are summarized briefly. The research work on anti-pollution attack in network coding is reviewed and some related important schemes are discussed briefly. Finally, the remaining problem is pointed out.
出处 《北京信息科技大学学报(自然科学版)》 2013年第1期88-94,共7页 Journal of Beijing Information Science and Technology University
基金 北京信息科技大学网络文化与数字传播北京市重点实验室开放课题资助(6ICDD201206 7ICDD201207)
关键词 网络编码 抗污染攻击 攻击者身份 network coding anti-pollution attack attacker' s identity
作者简介 张玉洁(1988-),女,河北保定人,硕士研究生,主要从事网络编码安全方面的研究。
  • 相关文献

参考文献1

二级参考文献16

  • 1Boneh D,Gentry C,Lynn B,et al.Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Advances in Cryptology—Eurocrypt2003,International Conference on the Theory and Applications of Cryptographic Techniques . 2003
  • 2Ahlswede R,Cai N,Li S Y R,et al.Network information flow. IEEE Transactions on Information Theory . 2000
  • 3Boneh D,Lynn B,Shacham H.Short Signatures from the Weil Pairing. Advances in Cryptology-Asiacrypt’2001 . 2001
  • 4Li S R,Yeung R W,Cai Ning.Linear network coding. IEEE Transactions on Information Theory . 2003
  • 5T.Ho,R.Koetter,M.Medard,D.Karger,M.Effros.The Benefits of Coding over Routing in a Randomized Setting. Information Theory,2003.Proceedings.IEEE International Symposium on . 2003
  • 6Ho T,Koetter R,Medard M, et al.Toward a random operation of networks. IEEE Transactions on Information Theory . 2004
  • 7Chou P A,Wu Y,Jain K.Practical Network Coding. 41st Allerton Conference on Communication,Control,and Computing . 2003
  • 8Cai N,Yeung R W.Secure Network Coding. http://personal.ie.cuhk.edu.hk/~ITIP/ISIT02/secure.ps . 2001
  • 9Krohn M N,Freedman M J,Mazieres D.On-the-fly verification of rateless erasure codes for efficient content distribution. IEEE Symposium on Security and Privacy . 2004
  • 10M.Bellare,O.Goldreich,S.Goldwasser.Incremental Cryptography:The Case of Hashing and Signing. CRYPTO’94 . 1994

共引文献7

同被引文献13

  • 1Ahlswede R, Cai N, Li SYR, et al. Network information flow. IEEE Trans. on Information Theory, 2000, 46(4): 1204-1216.
  • 2Li SYR, Yeung RW, Cai N. Linear network coding. IEEE Trans. on Information Theory, 2003, 49(2): 371-381.
  • 3Ho T, Koetter R, Medard M, et al. The benefits of coding over routing in a randomized setting. Proc. of the IEEE International Symposium on Information Theory. 2003. 442.
  • 4Krohn MN, Freedman MJ, Mazieres D. On-the-fly verification of rateless erasure codes for efficient content distribution. Proc. IEEE Symposium on Security and Privacy, 2004. IEEE. 2004. 226-240.
  • 5Kehdi E, Li B. Null keys: Limiting malicious attacks via null space properties of network coding. Proc.of INFOCOM'09. IEEE Press. 2009.
  • 6Yu Z, Wei YW, Ramkumar B, et al. An efficient signature-based scheme for securing network coding against pollution attacks. Proc. of the 27th IEEE Conference on Computer Communications (INFOCOM). Phoenix, AZ, US. IEEE Press. April 13-18, 2008. 2008. 1409-1417.
  • 7Yu Z, Wei YW, Ramkumar B, et al. An efficient scheme for securing XOR network coding against pollution attacks. Proc. of IEEE INFOCOM. Rio de Janeiro, Brazil. IEEE Press. April 19-25, 2009. 2009. 406-414.
  • 8Yun A, Cheon JH, Kim Y. On homomorphic signatures for network coding. IEEE Trans. on Computers, 2010, 59(9): 1295-1296.
  • 9Zhang P, Jiang YX, Lin C, et al. Padding for orthogonality: Efficient subspace authentication for network coding. Proc. of IEEE INFOCOM. Shanghai, China. IEEE Press. April 10-15, 2011. 2011. 1026-1034.
  • 10Gkantsidis C, Rodriguez PR. Cooperative Security for Network Coding File Distribution. Proc. of the 25th IEEE International Conference on Computer Communications (INFOCOM). Barcelona, Spain. IEEE Press. April 23-29, 2006. 2006. 1-13.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部