Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure network coding transmission method and secure network coding transmission device using cache nodes

A secure network and caching node technology, applied in the field of communication, can solve the problems of confidentiality violation, large amount of encryption, huge calculation amount, etc., and achieve the effect of reducing complexity

Active Publication Date: 2012-07-11
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are many implementations of secure network coding, but these implementations still have the following problems: using cryptographic encryption to achieve network confidentiality, this method can achieve the effect of confidentiality, but the amount of encryption required is too large , a huge amount of calculation will be generated in the process of encryption and decryption; use non-encryption means to achieve confidentiality, this method needs to limit the eavesdropper's eavesdropping ability to certain links, for eavesdroppers with strong eavesdropping ability, use Confidentiality achieved by non-encrypted means may be violated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure network coding transmission method and secure network coding transmission device using cache nodes
  • Secure network coding transmission method and secure network coding transmission device using cache nodes
  • Secure network coding transmission method and secure network coding transmission device using cache nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] According to the description of the summary of the invention, the embodiments are specified here.

[0024] figure 1 Is the flow chart of the present invention, such as figure 1 As shown, the transmission process of the data packet is carried out in the order of the source, the intermediate node and the sink, and the operation of the source, the intermediate node and the sink on the data packet is different, so the present invention is introduced in three parts.

[0025] Information source: The information source has the functions of constructing data packets and hiding the information of the source, and the specific implementation is as follows:

[0026] S101: The data sent by the source can be expressed as X=(X 1 X 2 …X j ), a total of j dimensions, the number of dimensions here can be understood as a total of j-dimensional data to be sent, one of the one-dimensional data is sent in turn; each of the data in the dimension corresponds to an n-dimensional information vector X i ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A secure network coding transmission method and a secure network coding transmission device using cache nodes specifically comprise functions of achieving confidentiality of a network through encrypted message source information and using integral check codes to achieve integrity check of the network. In encryption of message source information, the confidentiality function of the network can be achieved only by encrypting a part of information, thereby indirectly decreasing information quantity required to be encrypted. Middle nodes in the device have a caching function so that the integrity check is achieved through a middle node check method and a middle node retransmission method.

Description

Technical field [0001] The present invention relates to the field of communications, in particular to a method and device for secure network coding transmission using cache nodes. Background technique [0002] At present, the role of intermediate nodes in communication networks is mainly store and forward. It is difficult for the network to achieve the maximum flow goal proposed by Shannon. This situation has not changed until network coding is proposed. The original intention of network coding is to increase the maximum flow of the network, but in the research process, it is found that network coding also has a very good prospect in network security. [0003] For traditional multicast methods, if an eavesdropper has the opportunity to eavesdrop on a certain path of information in the network, it can restore the original data based on the eavesdropping information, because such information is "meaningful", and "meaningful" means eavesdropping. The information sent by the source is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00H04L9/00
Inventor 柏琳顾仁涛张林纪越峰
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products