Unlock instant, AI-driven research and patent intelligence for your innovation.

Network coding signature method capable of preventing pollution attacks and positioning intermediate node collusion attacks

An intermediate node and network coding technology, which is applied in the field of information security, can solve problems such as increased network bandwidth consumption, network paralysis, and sink nodes cannot correctly decode information, and achieve the effects of increasing the possibility of falsified information, high security, and high computing efficiency

Active Publication Date: 2019-08-23
HUBEI UNIV OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, current anti-pollution network coding methods are difficult to resist collusion attacks due to mechanism design
Allowing this kind of pollution to spread in the network coding system will cause the sink node to be unable to correctly decode the information, thereby increasing network bandwidth consumption and even causing network paralysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network coding signature method capable of preventing pollution attacks and positioning intermediate node collusion attacks
  • Network coding signature method capable of preventing pollution attacks and positioning intermediate node collusion attacks
  • Network coding signature method capable of preventing pollution attacks and positioning intermediate node collusion attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0023] please see figure 1 , a network code signature method capable of preventing pollution attacks and locating collusion attacks of intermediate nodes provided by the present invention adopts a network code system; the system includes a secret key distribution center KDC, a source node S, an intermediate node, and a sink node DC;

[0024] The method includes the following steps:

[0025] Step 1: System initialization;

[0026] please see figure 1 Step 1 in and figure 2 , the specific implementation of step 1 includes the following sub-steps:

[0027]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network coding signature method capable of preventing pollution attacks and positioning intermediate node collusion attacks. The network coding signature method comprises thefollowing five parts: system initialization, coding signature generation by an information source node, verification of correctness of a data packet by the intermediate node, recoding of the data packet by the intermediate node and tracking of malicious nodes by the information sink node. In the invention, a key distribution center distributes corresponding private keys to an information source node, an information sink node and intermediate nodes based on identities. The information source node uses the data packet signed by the private key of the information source node, and the intermediate node can perform data packet homomorphic verification by using the private key, but cannot forge the data packet which can pass the verification by using the held private key or collusion, otherwise, the data packet can be tracked. The method has the characteristics of the patent. According to the invention, the problem that the current network coding cannot resist pollution attack and track a forged attack source at the same time can be overcome.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a network code signature method, in particular to a network code signature method capable of preventing pollution attacks and locating intermediate node collusion attacks. Background technique [0002] The theory of network coding has revolutionized the traditional store-and-forward routing method. It can improve the reliability, throughput and energy efficiency of network transmission. In the traditional store-and-forward routing technology, the intermediate node of the data link is only responsible for forwarding data. In network coding systems, intermediate nodes can be recoded. This makes network-encoded packets more vulnerable to malicious attacks and more difficult to detect. To a certain extent, this hinders the application and development of network coding. [0003] The existing network coding attacks are mainly two kinds of eavesdropping attacks and pollut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00H04L29/06
CPCH04L9/3247H04L9/002H04L63/1441
Inventor 陈永辉舒红章张媛媛余辉袁金龙屠明明周辉扬
Owner HUBEI UNIV OF TECH