Secure network coding method for optical networks based on source information encryption

A security network and coding method technology, applied in the field of optical network security network coding based on source information encryption, can solve the problems of large number of encryption, danger, huge calculation amount, etc., to reduce the amount of encryption, achieve integrity, reduce The effect of complexity

Active Publication Date: 2012-04-25
BEIJING UNIV OF POSTS & TELECOMM
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are many implementations of secure network coding, but these implementations still have the following problems: the use of cryptographic encryption methods to achieve network confidentiality, this method can certainly achieve the effect of confidentiality, but the amount of encryption required is too large , a huge amount of calculation will be generated in the process of encryption and decryption; use non-encryption means to achieve confidentiality, this method needs to limit the eavesdropper's eavesdropping ability to certain links, for eavesdroppers with strong eavesdropping ability, use Non-encrypted methods to ensure the confidentiality of the network are dangerous

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure network coding method for optical networks based on source information encryption
  • Secure network coding method for optical networks based on source information encryption
  • Secure network coding method for optical networks based on source information encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] According to the description of the content of the invention, the implementation mode is specified here, and two situations are introduced in detail.

[0019] Finite field: the set F={a, b, ...}, two operations are defined on the elements of F: "+" and "*", and the following three conditions are satisfied:

[0020] 1. The elements of F constitute a commutative group with respect to the operation "+", and its unit element is set to be 0.

[0021] 2. The elements of F\{0} form a commutative group with respect to the operation "*". That is, after elements in F exclude element 0, an exchange group is formed with respect to "*".

[0022] 3. The allocation rate is established, that is, for any element a, b, c∈F, there is always a*(b+c)=(b+c)*a=a*b+a*c

[0023] When the number of elements in an F field is finite, it is called a finite field. It is assumed here that the finite field is sufficiently large.

[0024] figure 1 is a flowchart of the present invention, such as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a secure network coding method for optical networks based on source information encryption. The secure network coding method specifically comprises the steps of: realizing network security by using a method of encrypting information of an information source; and realizing a network integrity check function by using a method of integrity check codes. During source information encryption, the security function of the network can be realized as long as a small part of the information is encrypted, thereby quantity of information needed to be encrypted is indirectly reduced. A check function in the optical networks is realized by the methods of destination integrity check and source retransmission.

Description

technical field [0001] The invention relates to the communication field, in particular to an optical network security network coding method based on information source information encryption. Background technique [0002] Since Shannon proposed the maximum flow minimum cut theorem, the realization of the maximum flow of the network has been the direction of the researchers efforts. In the traditional multicast mode, the intermediate nodes only have the function of store and forward. It was not until the proposal of network coding that this situation changed. situation. Network coding can not only increase the maximum flow of the network, but it is also found in the research that network coding has broad prospects in network security. [0003] For the traditional multicast method, if an eavesdropper has the opportunity to eavesdrop on a certain channel of information in the network, it can restore the original data based on the eavesdropped information, because such informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00H04L9/00
Inventor 顾仁涛张林柏琳纪越峰
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products