Secure network coding method for optical networks based on source information encryption

A technology of secure network and coding method, which is applied in the field of optical network security network coding based on information source information encryption, can solve problems such as huge amount of calculation, large amount of encryption, and danger, so as to reduce the amount of encryption, achieve integrity, reduce effect of complexity

Active Publication Date: 2014-07-16
BEIJING UNIV OF POSTS & TELECOMM
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are many implementations of secure network coding, but these implementations still have the following problems: the use of cryptographic encryption methods to achieve network confidentiality, this method can certainly achieve the effect of confidentiality, but the amount of encryption required is too large , a huge amount of calculation will be generated in the process of encryption and decryption; use non-encryption means to achieve confidentiality, this method needs to limit the eavesdropper's eavesdropping ability to certain links, for eavesdroppers with strong eavesdropping ability, use Non-encrypted methods to ensure the confidentiality of the network are dangerous

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure network coding method for optical networks based on source information encryption
  • Secure network coding method for optical networks based on source information encryption
  • Secure network coding method for optical networks based on source information encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] According to the description of the content of the invention, the implementation mode is specified here, and two situations are introduced in detail.

[0019] Finite field: the set F={a, b, ...}, two operations are defined on the elements of F: "+" and "*", and the following three conditions are satisfied:

[0020] 1. The elements of F constitute a commutative group with respect to the operation "+", and its unit element is set to be 0.

[0021] 2. The elements of F\{0} form a commutative group with respect to the operation "*". That is, after elements in F exclude element 0, an exchange group is formed with respect to "*".

[0022] 3. The allocation rate is established, that is, for any element a, b, c∈F, there is always a*(b+c)=(b+c)*a=a*b+a*c

[0023] When the number of elements in an F field is finite, it is called a finite field. It is assumed here that the finite field is sufficiently large.

[0024] figure 1 is a flowchart of the present invention, such as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An optical network security network coding method based on information source information encryption, which specifically includes: using the method of information source information encryption to realize the confidentiality of the network, and using the method of integrity check code to realize the function of network integrity inspection. In source information encryption, only a small part of the information needs to be encrypted to realize the confidentiality function of the network, which indirectly reduces the amount of information that needs to be encrypted. The verification function in the optical network is realized by means of the sink checking the integrity and the source retransmitting.

Description

technical field [0001] The invention relates to the communication field, in particular to an optical network security network coding method based on information source information encryption. Background technique [0002] Since Shannon proposed the maximum flow minimum cut theorem, the realization of the maximum flow of the network has been the direction of the researchers efforts. In the traditional multicast mode, the intermediate nodes only have the function of store and forward. It was not until the proposal of network coding that this situation changed. situation. Network coding can not only increase the maximum flow of the network, but it is also found in the research that network coding has broad prospects in network security. [0003] For the traditional multicast method, if an eavesdropper has the opportunity to eavesdrop on a certain channel of information in the network, it can restore the original data based on the eavesdropped information, because such informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L1/00H04L9/00
Inventor 顾仁涛张林柏琳纪越峰
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products