计算机应用 ›› 2014, Vol. 34 ›› Issue (8): 2350-2355.DOI: 10.11772/j.issn.1001-9081.2014.08.2350

• 计算机安全 • 上一篇    下一篇

网络编码数据传输的联合保障机制

朱馨培1,寇应展1,王湛昱2,3   

  1. 1. 军械工程学院 信息工程系,石家庄050003;
    2. 哈尔滨工业大学 航天学院,哈尔滨150001;
    3. 哈尔滨工业大学 机电工程学院,哈尔滨150001
  • 收稿日期:2014-02-10 修回日期:2014-03-12 出版日期:2014-08-01 发布日期:2014-08-10
  • 通讯作者: 朱馨培
  • 作者简介:朱馨培(1991-),女,吉林长春人,硕士研究生,主要研究方向:网络信息安全;寇应展(1962-),男,河北石家庄人,教授,硕士,主要研究方向:信息安全、密码学;王湛昱(1982-),男,吉林长春人,工程师,硕士,主要研究方向:计算机网络、网络化控制。
  • 基金资助:

    国家自然科学基金资助项目

network coding; data transmission; digital watermarking; stack shuffle; Message Authentication Code (MAC)

ZHU Xinpei1,KOU Yingzhan1,WANG Zhanyu2,3   

  1. 1. Department of Information Engineering, Ordnance Engineering College, Shijiazhuang Hebei 050003, China;
    2. School of Astronautics, Harbin Institute of Technology, Harbin Heilongjiang 150001, China;
    3. School of Mechatronics Engineering, Harbin Institute of Technology, Harbin Heilongjiang 150001, China
  • Received:2014-02-10 Revised:2014-03-12 Online:2014-08-01 Published:2014-08-10
  • Contact: ZHU Xinpei

摘要:

为了提高基于网络编码的数据传输的完整性、机密性和隐私性,提出了一种使用数字水印、栈混洗和信息认证码(MAC)等技术的安全保障机制。该机制通过异或(XOR)加密和栈混洗技术来混淆信息,提供机密性和隐私保证;通过数字水印将信息认证码随机插入混淆后的信息,进而提高机密性;中间转发节点通过验证部分信息认证码来提供完整性保证。仿真结果表明,该机制能有效降低污染信息传播跳数(低于1.5跳),即使拥有25个共谋攻击者和密钥池大小为100时,共谋概率也仅为0.1。理论分析和仿真实验证明,所提机制使得基于网络编码的数据传输能以较低的性能开销抵抗偷听攻击、流量分析攻击和污染攻击。

Abstract:

To improve the integrity, confidentiality and privacy of network-coding-based data transmission, a secure protection mechanism combined digital watermarking, stack shuffle and Message Authentication Code (MAC) was proposed. In this mechanism, the confidentiality and privacy were provided by mixing up messages using exclusive OR (XOR) encryption and stack shuffle. Furthermore, the confidentiality was enhanced by randomly inserting MACs into mixed messages with digital watermarking technique. And the integrity was provided by checking MACs on intermediate nodes during transmitting. The simulation results show that the spread hops of polluted information were effectively reduced by using this mechanism (less than 1.5). The collusion probability was less than 0.1 even if there were 25 collusion attackers and the size of key pool was 100. Both of theoretical analysis and simulation experiment demonstrate that the proposed mechanism can defend eavesdropping attacks, flow analysis attacks and polluting attacks with low expense.

中图分类号: