Network coding signature method capable of preventing pollution attacks and positioning intermediate node collusion attacks
An intermediate node and network coding technology, which is applied in the field of information security, can solve problems such as increased network bandwidth consumption, network paralysis, and sink nodes cannot correctly decode information, and achieve the effects of increasing the possibility of falsified information, high security, and high computing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.
[0023] please see figure 1 , a network code signature method capable of preventing pollution attacks and locating collusion attacks of intermediate nodes provided by the present invention adopts a network code system; the system includes a secret key distribution center KDC, a source node S, an intermediate node, and a sink node DC;
[0024] The method includes the following steps:
[0025] Step 1: System initialization;
[0026] please see figure 1 Step 1 in and figure 2 , the specific implementation of step 1 includes the following sub-steps:
[0027]...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


