Unlock instant, AI-driven research and patent intelligence for your innovation.

Message authentication code and probability secret key distribution mechanism-based anti-pollution network coding method

A message authentication code and key distribution technology, which is applied in the direction of error prevention, user identity/authority verification, digital transmission system, etc., can solve problems such as poor security, large message redundancy, and large computational complexity, so as to deal with attacks, The effect of low communication overhead and high computational security

Inactive Publication Date: 2014-04-23
ZHEJIANG UNIV OF TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the shortcomings of the existing anti-pollution attack methods, such as high computational complexity, low data transmission rate, large message redundancy, and poor security, the present invention provides a method based on message authentication code and probabilistic key distribution mechanism. Anti-pollution secure network coding method, which is based on the advantages of message authentication code and probabilistic key distribution mechanism in cryptography, has high computational security, and can effectively deal with the attack of message polluters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message authentication code and probability secret key distribution mechanism-based anti-pollution network coding method
  • Message authentication code and probability secret key distribution mechanism-based anti-pollution network coding method
  • Message authentication code and probability secret key distribution mechanism-based anti-pollution network coding method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0028] refer to figure 1 and figure 2 , an anti-pollution network coding method based on message authentication code and probabilistic key distribution mechanism, including the following process:

[0029] In order to solve the problem of node information being polluted during data transmission, a corresponding multi-source multicast model research scenario is established.

[0030] figure 1 is the multi-source multicast system model, in this figure, s 1 ,s 2 ,...,s k is the source node, t 1 , t 2 ,...,t p For the sink node, there are multiple forwarding nodes. Assuming that the source node is credible, it is necessary to ensure that during the process of sending information from the source node to the forwarding node and from the forwarding node to the sink node, the polluting nodes must be detected and filtered as early as possible, so that the info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a message authentication code and probability secret key distribution mechanism-based anti-pollution network coding method. The method comprises the following steps: step one, information source node parameter establish; step two, MAV value calculation; and step three, forwarding node and information receiver node message authentication. To be specific, according to the step three, whether the forwarding node and the information receiver node verification message packet is polluted is determined. The MAC value is used for code word authentication in the message; the forwarding node and the information receiver node verify the MAC value of the input message code word based on the secret pair shared with the information source node, and code words for MAC value calculation in the message are obtained; the coding result of the code words is compared with a Hash value in a decryption result; if the coding result is identical with the Hash value, the message packet is not polluted; and otherwise, the packet is determined to be polluted, so that the forwarding node and the information receiver node can detect or filter the polluted message packet as early as possible. According to the invention, on the basis of the message authentication code and probability secret key distribution mechanism in the cryptology, the provided method has the high calculation security and the attack from the message polluter can be effectively dealt with.

Description

technical field [0001] The invention relates to network coding technology and cryptography technology, in particular to a safe network coding method against pollution attack, which is based on the characteristics of message authentication code and probability key distribution mechanism. technical background [0002] Professor Medard, an internationally renowned expert in the field of network computing, pointed out: "Network coding has the potential to greatly increase the speed of network transmission and improve the reliability of all communication systems, and will trigger the next generation of network revolution." They predict that network coding technology will have a huge impact on many fields in the next ten years. From computer communication, wireless communication to other types of communication, network coding will be widely used. Network coding has fundamentally changed the information transmission mode of communication networks, and is a major breakthrough in the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00H04L9/32
Inventor 程珍池凯凯赵城
Owner ZHEJIANG UNIV OF TECH