CN102571281B - A kind of secure network coding and transmission method and device that uses cache node - Google Patents
A kind of secure network coding and transmission method and device that uses cache node Download PDFInfo
- Publication number
- CN102571281B CN102571281B CN201210006291.6A CN201210006291A CN102571281B CN 102571281 B CN102571281 B CN 102571281B CN 201210006291 A CN201210006291 A CN 201210006291A CN 102571281 B CN102571281 B CN 102571281B
- Authority
- CN
- China
- Prior art keywords
- information
- data packet
- data
- network
- source
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 230000005540 biological transmission Effects 0.000 title claims description 19
- 239000013598 vector Substances 0.000 claims description 27
- 238000011144 upstream manufacturing Methods 0.000 claims description 13
- 230000008569 process Effects 0.000 claims description 12
- 238000004364 calculation method Methods 0.000 claims description 7
- 238000010276 construction Methods 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011017 operating method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域technical field
本发明涉及通信领域,特别涉及一种使用缓存节点的安全网络编码传输方法和装置。The present invention relates to the communication field, in particular to a method and device for secure network code transmission using cache nodes.
背景技术Background technique
目前通信网络,中间节点的作用主要是存储转发,网络很难达到香农提出的最大流的目的,直到网络编码提出,这一状况才得到改变。网络编码的初衷是为了增加网络的最大流,但是在研究过程中发现,网络编码在网络安全方面同样有着非常好的前景。In the current communication network, the role of intermediate nodes is mainly to store and forward, and it is difficult for the network to achieve the goal of maximum flow proposed by Shannon. This situation was not changed until the network coding was proposed. The original intention of network coding is to increase the maximum flow of the network, but it is found in the research process that network coding also has a very good prospect in terms of network security.
对于传统的组播方式,如果窃听者有机会窃听到网络中某一路信息,它可以根据窃听得到的信息恢复原始数据,因为这样的信息是“有意义的”,“有意义”是指窃听到的信息跟信源发出的信息是相同的,在安全性要求较高的情况下,传统组播防窃听能力就相应的比较弱;而在基于网络编码的数据传输方式中,编码节点有对不同链路的信息进行混合的功能,从而把“有意义的”信息转变成“无意义的”,这种方法使得网络编码具有了一定的保密性,尽管如此,窃听者在窃听到多路信息并了解网络编码的编解码构造方法之后,仍然可以通过得到的多路信息恢复原始信息;另外,正是由于网络编码可以对信息进行混合,一旦上游链路的信息产生误码或者被其他攻击者篡改数据,下游链路的信息就很有可能变成错误的,这样会增大错误的覆盖范围,对网络信息安全产生不好的影响。因此,将网络编码应用于网络安全中,信息的保密性和完整性显得尤其重要。For the traditional multicast method, if an eavesdropper has the opportunity to eavesdrop on a certain channel of information in the network, it can restore the original data based on the eavesdropped information, because such information is "meaningful", and "meaningful" means eavesdropping The information sent by the source is the same as the information sent by the source. In the case of high security requirements, the anti-eavesdropping ability of traditional multicast is relatively weak; while in the data transmission method based on network coding, the coding nodes have different pairs of The function of mixing the information of the link, so as to change the "meaningful" information into "meaningless", this method makes the network coding have a certain degree of confidentiality, however, the eavesdropper is eavesdropping on the multi-channel information and After understanding the codec construction method of network coding, the original information can still be restored through the obtained multi-channel information; in addition, it is precisely because network coding can mix information, once the information on the upstream link is wrong or tampered with by other attackers Data, the information of the downstream link is likely to become wrong, which will increase the coverage of errors and have a bad impact on network information security. Therefore, when network coding is applied to network security, the confidentiality and integrity of information are particularly important.
安全网络编码已经有多种实现方式,但是这些实现方式仍然存在如下问题:使用密码学加密的方法来实现网络的保密性,这种方法固然可以达到保密性的效果,但是需要加密的数量太大,在加密和解密的过程中会产生巨大的计算量;使用非加密的手段实现保密性,这种方法需要把窃听者的窃听能力局限在某些链路,对于窃听能力强的窃听者,使用非加密手段实现的保密性有可能被破坏。因此在保证网络保密性的情况下减少加密量,并且不限制窃听者的窃听范围就成为安全网络编码的一个研究热点。本发明就是针对上面提到的两个实际情况,使用一种安全有效的方法来实现保密通信。同时,在网络编码中,一旦遭受篡改攻击,就会扩大错误的覆盖范围,本发明兼顾到信息的完整性检验的功能,将网络保密性和完整性检验的功能融合到一起。There are many implementations of secure network coding, but these implementations still have the following problems: using cryptographic encryption to achieve network confidentiality, this method can achieve the effect of confidentiality, but the amount of encryption required is too large , a huge amount of calculation will be generated in the process of encryption and decryption; use non-encryption means to achieve confidentiality, this method needs to limit the eavesdropper's eavesdropping ability to certain links, for eavesdroppers with strong eavesdropping ability, use Confidentiality achieved by non-encrypted means may be compromised. Therefore, reducing the amount of encryption without limiting the eavesdropper's eavesdropping range while ensuring network confidentiality has become a research hotspot in secure network coding. The present invention aims at the two actual situations mentioned above, and uses a safe and effective method to realize confidential communication. At the same time, in network coding, once a tampering attack is encountered, the coverage of errors will be expanded. The present invention takes into account the integrity check function of information, and integrates the functions of network confidentiality and integrity check.
发明内容Contents of the invention
本发明提供了一种使用缓存节点的安全网络编码传输方法和装置,能够通过对信源信息进行加密实现网络编码的保密传输,同时能够使用具有缓存功能的中间节点实现数据包的完整性校验的功能,具有加密量小,不限制窃听者的窃听能力的优点,同时能够提供完整性检验的功能。The present invention provides a method and device for secure network code transmission using a cache node, which can realize secure transmission of network code by encrypting source information, and can use an intermediate node with a cache function to realize integrity verification of data packets The function has the advantages of small amount of encryption, does not limit the eavesdropper's eavesdropping ability, and can provide the function of integrity verification at the same time.
为达成上述发明目标,在此有如下技术方案:For reaching above-mentioned object of invention, following technical scheme is arranged here:
使用缓存节点的安全网络编码传输方法:随机线性网络编码是本发明采用的传输方式,随机线性网络编码是指编码节点对接收到的数据包进行线性操作,使用的编码向量是在有限域内随机选取的。由于节点类型不同,因此在信源、中间节点和信宿的操作都不相同。Secure network coding transmission method using cache nodes: Random linear network coding is the transmission method adopted in the present invention. Random linear network coding means that the coding node performs linear operations on the received data packets, and the coding vector used is randomly selected in the finite field of. Due to the different types of nodes, the operations at the source, intermediate nodes and sink are different.
有限域:集合F={a,b,…},对F的元素定义了两种运算:“+”和“*”,并满足以下3个条件:Finite field: the set F={a, b, ...}, two operations are defined on the elements of F: "+" and "*", and the following three conditions are satisfied:
1、F的元素关于运算“+”构成交换群,设其单位元素为0。1. The elements of F constitute a commutative group with respect to the operation "+", and its unit element is set to be 0.
2、F\{0}的元素关于运算“*”构成交换群。即F中元素排除元素0后,关于“*”构成交换群。2. The elements of F\{0} form a commutative group with respect to the operation "*". That is, after elements in F exclude element 0, an exchange group is formed with respect to "*".
3、分配率成立,即对于任意元素a,b,c∈F,恒有a*(b+c)=(b+c)*a=a*b+a*c3. The allocation rate is established, that is, for any element a, b, c∈F, there is always a*(b+c)=(b+c)*a=a*b+a*c
F域的元素数目有限时称为有限域。在此假设有限域足够大。When the number of elements in an F field is finite, it is called a finite field. It is assumed here that the finite field is sufficiently large.
本发明在信源、中间节点和信宿的具体操作方法如下:The concrete operating method of the present invention at source, intermediate node and letter sink is as follows:
信源:构造数据包,包括编码向量、载荷和完整性校验码三部分;编码向量是在有限域中随机选取,放在数据包的前面;对信源信息的其中一维信息进行加密,然后使用哈希函数和计算公式对其他信源信息进行处理,得到用于网络传输的信息,使用随机选取的编码向量对用于网络传输的信息进行编码操作得到载荷;根据校验码公式、编码向量和载荷计算完整性校验码。Source: Construct a data packet, including three parts: encoding vector, payload and integrity check code; the encoding vector is randomly selected in the finite field and placed in front of the data packet; one-dimensional information of the source information is encrypted, Then use the hash function and calculation formula to process other source information to obtain the information for network transmission, and use the randomly selected encoding vector to encode the information for network transmission to obtain the load; according to the check code formula, encoding Vectors and payloads compute integrity checksums.
中间节点:接收到数据包之后,中间节点首先进行完整性校验,如果未被篡改,首先进行网络编码操作,然后计算新的完整性校验码;如果被篡改,需要申请上游节点重传,在得到正确的数据包之后,对数据包进行编码操作并重组,构造新的数据包和新的完整性校验码,并向下传输。由于中间节点具有缓存功能,因此当下游数据包发现错误之后,可以请求上游节点直接重传,这样中间节点的复杂度增加了,但是会减少可能的重传过程占用的链路数目。Intermediate node: After receiving the data packet, the intermediate node first performs an integrity check. If it has not been tampered with, it first performs a network coding operation, and then calculates a new integrity check code; if it is tampered with, it needs to apply to the upstream node for retransmission. After the correct data packet is obtained, the data packet is encoded and reassembled, and a new data packet and a new integrity check code are constructed and transmitted downward. Since the intermediate node has a cache function, when the downstream data packet finds an error, it can request the upstream node to retransmit directly, which increases the complexity of the intermediate node, but reduces the number of links occupied by the possible retransmission process.
信宿:接收到数据包之后,信宿完成完整性校验的功能,如果数据包被篡改,那么需要请求上游节点重传,如果未被篡改,则直接解码即可。Sink: After receiving the data packet, the sink completes the integrity check function. If the data packet is tampered with, it needs to request the upstream node to retransmit it. If it has not been tampered with, it can be directly decoded.
使用缓存节点的安全网络编码传输装置:信源是信息的输入装置和数据包的构造装置,中间节点是数据包的“存储-编码-转发”装置,信宿是数据包的接收和解码装置。The secure network coding transmission device using cache nodes: the source is the information input device and the data packet construction device, the intermediate node is the data packet "storage-encoding-forwarding" device, and the sink is the data packet receiving and decoding device.
从以上技术方案可以看出,本发明具有以下优点:As can be seen from the above technical solutions, the present invention has the following advantages:
本发明中,只需要加密部分信源信息,比已有的加密信源信息的方法取得了更大的优越性,加密解密的复杂度也大大减小;不限制窃听者的窃听能力,也就是网络的任意链路都可以被窃听,但是窃听者具有有限的计算能力,不能通过穷举法得到原始信息;保密性和完整性校验的功能是同时实现的,不会产生干扰。In the present invention, only part of the source information needs to be encrypted, which has greater advantages than the existing method of encrypting source information, and the complexity of encryption and decryption is also greatly reduced; the eavesdropper's ability to eavesdrop is not limited, that is, Any link of the network can be eavesdropped, but the eavesdropper has limited computing power and cannot obtain the original information through exhaustive methods; the functions of confidentiality and integrity verification are realized simultaneously without interference.
附图说明Description of drawings
为了更清楚地说明本发明的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的流程图,在信源、中间节点和信宿的信息输入输出图,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to illustrate the technical solution of the present invention more clearly, the accompanying drawings that need to be used in the embodiments will be briefly introduced below. Obviously, the accompanying drawings in the following description are flow charts of the present invention. For the information input and output diagrams of the receiver and the sink, those skilled in the art can also obtain other drawings based on these drawings without any creative work.
图1为本发明的流程图;Fig. 1 is a flowchart of the present invention;
图2为本发明的实现装置图;Fig. 2 is the realization device figure of the present invention;
具体实施方式detailed description
根据发明内容的描述,在此对实施方式具体化。Embodiments are embodied here according to the description of the summary of the invention.
图1是本发明的流程图,如图1所示,数据包的传送过程是按照信源、中间节点和信宿的顺序进行的,而且信源、中间节点和信宿对数据包的操作是不同的,因此分三部分对本发明进行介绍。Fig. 1 is a flowchart of the present invention, as shown in Fig. 1, the transmission process of data packet is carried out according to the order of information source, intermediate node and information destination, and information source, intermediate node and information destination are different to the operation of data packet , so the present invention is introduced in three parts.
信源:信源具有构造数据包和隐藏信源信息的功能,具体实现方式如下:Source: The source has the function of constructing data packets and hiding source information. The specific implementation method is as follows:
S101:信源发送的数据可以表示为X=(X1X2…Xj),共有j维,这里的维数可以理解为共有j维数据需要发送,依次发送其中一维数据;其中每一维数据都对应着n维的信息向量Xi=(xi1xi2…xin)T,i=1…j,为方便操作,确定n维数据中每一维数据的第一个信息是需要加密的,在这里可以使用但不限于AES加密方法,将xi1加密为Ei。S101: The data sent by the source can be expressed as X=(X 1 X 2 ...X j ), and there are j dimensions in total. The dimension here can be understood as a total of j-dimensional data to be sent, and one-dimensional data is sent in sequence; each All the dimensional data correspond to the n-dimensional information vector Xi = (x i1 x i2 ... x in ) T , i = 1 ... j, for the convenience of operation, it is necessary to determine the first information of each dimensional data in the n-dimensional data Encrypted, here you can use but not limited to the AES encryption method to encrypt x i1 into E i .
S102:在得到加密数据之后,构造信源发出的在网络中传输的数据,为了使得所有数据都跟被加密的数据产生相关性,同时保证信息不可解密,这里使用哈希函数h(),因为哈希函数是单向的,根据输入x,可以很容易计算出来h(x),但是根据h(x),得到x在计算上是不可实现的。使用哈希函数进行处理的过程如下:S102: After obtaining the encrypted data, construct the data transmitted in the network sent by the source. In order to make all the data related to the encrypted data and ensure that the information cannot be decrypted, the hash function h() is used here, because The hash function is one-way. According to the input x, h(x) can be easily calculated, but according to h(x), it is computationally impossible to obtain x. The process of processing using a hash function is as follows:
而xi1′=Ei+h(xi2′)不仅可以保证保密性,而且便得网络中传输的数据都有相同的形式,在此使用Xi′=(xi1′xi2′…xin′)T,i=1…j表示网络中传输的数据,i=1…j表示数据有j组。在计算出来网络中传输的数据之后,假设编码向量表示方法为Di 1=(di1 1…din 1)i=1,…k,D1=(D1 1D2 1…Dk 1)T,对于网络中第t组被传输信息,计算得到载荷Yi 1=Di 1Xi′i=1,...,k,Yi 1=(yi1 1yi2 1…yij 1)i=1,...,k,得到的Yi 1就是数据包的载荷。多个载荷可以并列排在数据包中。And x i1 ′=E i +h(x i2 ′) can not only guarantee the confidentiality, but also make the data transmitted in the network have the same form, here use X i ′=(x i1 ′x i2 ′…x in ′) T , i=1...j means the data transmitted in the network, and i=1...j means there are j sets of data. After calculating the data transmitted in the network, it is assumed that the encoding vector representation method is D i 1 =(d i1 1 …d in 1 )i=1,…k, D 1 =(D 1 1 D 2 1 …D k 1 ) T , for the tth group of transmitted information in the network, the calculated load Y i 1 =D i 1 X i ′i=1,...,k, Y i 1 =(y i1 1 y i2 1 ...y ij 1 ) i=1,...,k, the obtained Y i 1 is the payload of the data packet. Multiple payloads can be placed side by side in a packet.
在计算完载荷之后,信源需要计算完整性校验码,通过公式
S103:在得到编码向量、载荷和校验码之后,信源就可以根据这些数据组成数据包,用于网络传输。信源发出的数据包的格式如下,右上角的1表示为区别处于网络中不同位置的数据包,采用不同的上角标标示,如后面使用的s都是相同的含义:S103: After obtaining the encoding vector, payload and check code, the information source can compose a data packet based on these data for network transmission. The format of the data packet sent by the source is as follows. The 1 in the upper right corner means to distinguish the data packets in different positions in the network, which are marked with different upper corner marks. For example, the s used later has the same meaning:
中间节点:中间节点接收到数据之后,需要先进行完整性校验,如果确认信息是完整的,再构造新的数据包并转发数据包,中间节点分为两种,分别是编码节点和非编码节点,编码节点可以对接收到的数据包进行完整性检验、编码操作然后转发,非编码节点对接收到的数据包进行完整性检验并直接转发,具体实施过程为:Intermediate node: After the intermediate node receives the data, it needs to perform an integrity check first. If the information is confirmed to be complete, then construct a new data packet and forward the data packet. The intermediate nodes are divided into two types, namely, encoding nodes and non-encoding nodes. Nodes, coded nodes can perform integrity checks on received data packets, encode them and then forward them, and non-encoded nodes can perform integrity checks on received data packets and forward them directly. The specific implementation process is as follows:
对于具有缓存功能的中间节点,首先需要检验数据包的完整性S104,根据接收到的数据包,使用公式计算完整性校验码,并和接收到的完整性校验码进行对比,如果相同证明数据包是没有被篡改的,使用当前网络编码向量进行网络编码操作,注意,只对编码向量和载荷进行,可以不对完整性校验码进行网络编码操作,完整性校验码是在得到新的编码向量和载荷之后,重新计算得到的,之后构造新的数据包,包括编码向量、载荷和新的完整性校验码,并向下传输S106;如果不相同,那么证明该数据包是被篡改的,申请上游节点重传S105并检验,直至接收到完整的数据包,之后使用当前网络编码向量进行网络编码操作,同样只对编码向量和载荷进行,可以不对完整性校验码进行网络编码操作,完整性校验码是在得到新的编码向量和载荷之后,重新计算得到的,之后构造新的数据包,包括编码向量、载荷和新的完整性校验码,并向下传输S106。由于中间节点需要对数据进行重传,因此中间节点必须具有缓存功能,也就是对当前传输的数据进行缓存,这样当下游节点需要上游节点重传的时候,直接调用缓存的里面的数据即可,因此这种重传模式只适合电网络,对于光网络并不适合。For an intermediate node with cache function, firstly it is necessary to check the integrity of the data packet S104, according to the received data packet, use the formula Calculate the integrity check code and compare it with the received integrity check code. If the same proves that the data packet has not been tampered with, use the current network encoding vector to perform the network encoding operation. Note that only the encoding vector and payload , it is not necessary to perform network coding operations on the integrity check code. The integrity check code is recalculated after the new encoding vector and payload are obtained, and then a new data packet is constructed, including the encoding vector, payload and new complete If it is not the same, it proves that the data packet has been tampered with, and the upstream node is requested to retransmit S105 and check until the complete data packet is received, and then use the current network coding vector for network The encoding operation is also only performed on the encoding vector and payload, and the network encoding operation on the integrity check code is not required. The integrity check code is recalculated after obtaining the new encoding vector and payload, and then constructs new data packet, including encoding vector, payload and new integrity check code, and transmit it downward S106. Since the intermediate node needs to retransmit the data, the intermediate node must have a cache function, that is, cache the currently transmitted data, so that when the downstream node needs to retransmit the upstream node, it can directly call the data in the cache. Therefore, this retransmission mode is only suitable for electrical networks, not for optical networks.
得到的数据包的格式依旧如下,网络中数据包的格式是没有变化的。The format of the obtained data packet is still as follows, and the format of the data packet in the network has not changed.
信宿:信宿在接收到数据包之后,需要进行完整性校验并进行解码。Sink: After receiving the data packet, the sink needs to perform integrity check and decode.
信宿首先进行完整性校验,如果数据包是完整的,那么进行解密解码操作;如果是不完整的,那么需要请求上游节点重传,得到正确的数据包之后,开始解密解码操作。The sink first performs an integrity check. If the data packet is complete, it will perform decryption and decoding operations; if it is incomplete, it needs to request the upstream node to retransmit. After the correct data packet is obtained, the decryption and decoding operation will start.
完整性校验:在接收到数据包之后,信宿根据完整性校验码的计算公式,检验数据包是否被篡改,如果数据包是完整的,未被篡改S108,那么信宿对接收到的数据开始解码操作;如果接收到的数据包被篡改,那么请求上游节点重传。Integrity check: After receiving the data packet, the sink checks whether the data packet has been tampered with according to the calculation formula of the integrity check code. If the data packet is complete and has not been tampered with S108, then the sink begins to check the received data. Decoding operation; if the received data packet is tampered with, then request the upstream node to retransmit.
解码过程:S109在接收到数据包之后,信宿根据网络编码的传输机制,可以恢复出来信源发出的用于网络传输的信息,信宿的入度定为r,为使得解码能够正常进行,要求(r≥n)。具体的解码过程和公式如下:Decoding process: S109 After receiving the data packet, the sink can recover the information sent by the source for network transmission according to the transmission mechanism of the network coding. The in-degree of the sink is set to r. In order to make the decoding work normally, it is required that ( r≥n). The specific decoding process and formula are as follows:
由于中间节点不会对数据包进行重组,而仅仅是进行线性操作,数据包各部分对应的功能跟之前完全一样,信宿得到的数据包的格式跟中间节点接收到的数据包的格式是相同的,因此可以得知信宿得到的数据为:Since the intermediate node does not reassemble the data packet, but only performs linear operations, the corresponding functions of each part of the data packet are exactly the same as before, and the format of the data packet obtained by the sink is the same as the format of the data packet received by the intermediate node. , so it can be known that the data obtained by the sink is:
根据网络编码的传输机制,以及数据包的构成方式,可以得到如下式子:According to the transmission mechanism of network coding and the composition of data packets, the following formula can be obtained:
由于(r≥n),因此只需要r维函数即可得到信源发出的用于网络传输的信息,Xi′=(xi1′xi2′…xin′)T,i=1…j,根据Xi′的构造过程,可以得到Ei=xi1′-h(xi2′),根据共享密钥,可以解密Ei得到xi1,根据如下公式,可以计算得到所有信息。Since (r≥n), only the r-dimensional function is needed to obtain the information sent by the source for network transmission, X i ′=(x i1 ′x i2 ′…x in ′) T , i=1…j , according to the construction process of Xi ′, E i = xi1 ′-h( xi2 ′) can be obtained, according to the shared key, E i can be decrypted to obtain xi1 , and all information can be calculated according to the following formula.
因此信宿可以恢复信源信息。So the sink can recover the source information.
本发明在信源、中间节点和信宿的功能各不相同,信源主要起着构造数据包的作用,中间节点起着校验-转发-重传的作用,信宿起着检验数据包的完整性和恢复信源发送信息的功能。The present invention has different functions in the information source, intermediate node and information destination. The information source mainly plays the role of constructing the data packet, the intermediate node plays the role of verification-forwarding-retransmission, and the information destination plays the role of checking the integrity of the data packet. And the function of recovering the information sent by the source.
图2是本发明的实现装置图:Fig. 2 is the realization device figure of the present invention:
本发明中,信源201是信息的输入装置和数据包的构造装置,对应步骤S101-S103,信源根据输入的信息和校验码公式计算完整性校验码,然后加密部分信源信息,通过哈希函数和一定的计算公式对信源的其他信息进行随机化处理,使用编码向量对随机化之后的数据进行网络编码计算得到载荷。根据编码向量、载荷和完整性校验码的顺序构造数据包,之后信源输出数据包。In the present invention, the information source 201 is an information input device and a data packet construction device, corresponding to steps S101-S103, the information source calculates the integrity check code according to the input information and the check code formula, and then encrypts part of the information source information, Use the hash function and certain calculation formulas to randomize other information of the source, and use the encoding vector to perform network encoding calculation on the randomized data to obtain the load. The data packet is constructed according to the sequence of encoding vector, payload and integrity check code, and then the source outputs the data packet.
中间节点202是数据包的“存储-编码-转发”装置,对应步骤S104-S107,中间节点对来自信源或者其他中间节点的数据包,计算完整性校验码,同时跟接收到数据包的完整性校验码进行对比,如果相同证明数据包是完整的,如果不相同,证明数据包是被篡改过的,可以请求上游节点重传,直至接收到正确的数据包。中间节点对接收到的正确的数据包的编码向量和载荷部分进行网络编码操作,根据得到的新信息计算完整性校验码,组成新的数据包并向下转发。The intermediate node 202 is a "storage-encoding-forwarding" device for data packets, corresponding to steps S104-S107, the intermediate node calculates the integrity check code for the data packets from the source or other intermediate nodes, and simultaneously follows the received data packet If they are the same, it proves that the data packet is complete. If not, it proves that the data packet has been tampered with. You can request the upstream node to retransmit until the correct data packet is received. The intermediate node performs network coding operation on the encoding vector and payload part of the received correct data packet, calculates the integrity check code according to the obtained new information, forms a new data packet and forwards it downward.
信宿203是数据包的接收和解码装置,对应步骤S108-S109,信息的输入是信宿接收到的数据包,接收之后,信宿对数据包进行完整性校验,如果数据包是完整的,那么直接解码解密即可;如果数据包不是完整的,那么请求上游节点重传,直至接收到完整的数据包,然后解码解密得到信源发送的信息。The sink 203 is a device for receiving and decoding data packets, corresponding to steps S108-S109, the input of information is the data packets received by the sink, after receiving, the sink checks the integrity of the data packets, if the data packets are complete, then directly Decoding and decryption is enough; if the data packet is not complete, then request the upstream node to retransmit until the complete data packet is received, and then decode and decrypt to obtain the information sent by the source.
以上所述,仅为本发明常见的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应该以权利要求的保护范围为准。The above are only common specific implementations of the present invention, but the scope of protection of the present invention is not limited thereto. Any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in the present invention. , should be covered within the protection scope of the present invention. Therefore, the protection scope of the present invention should be determined by the protection scope of the claims.
Claims (6)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201210006291.6A CN102571281B (en) | 2012-01-09 | 2012-01-09 | A kind of secure network coding and transmission method and device that uses cache node |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201210006291.6A CN102571281B (en) | 2012-01-09 | 2012-01-09 | A kind of secure network coding and transmission method and device that uses cache node |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102571281A CN102571281A (en) | 2012-07-11 |
| CN102571281B true CN102571281B (en) | 2016-05-25 |
Family
ID=46415830
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201210006291.6A Active CN102571281B (en) | 2012-01-09 | 2012-01-09 | A kind of secure network coding and transmission method and device that uses cache node |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN102571281B (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103199935B (en) * | 2013-02-01 | 2016-04-06 | 北京邮电大学 | Based on the methods, devices and systems of the network code connection management of ONU study |
| CN104991528B (en) * | 2015-05-14 | 2018-02-13 | 福州福大自动化科技有限公司 | DCS information security control methods and control station |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101267277A (en) * | 2008-04-30 | 2008-09-17 | 西安电子科技大学 | Anti-eavesdropping and anti-pollution network coding method |
| CN101714910A (en) * | 2009-11-20 | 2010-05-26 | 西安电子科技大学 | Anti-pollution network encoding method based on probability detection |
| CN102208976A (en) * | 2011-07-21 | 2011-10-05 | 北京邮电大学 | Coding vector encryption based secure network coding method |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8250356B2 (en) * | 2008-11-21 | 2012-08-21 | Motorola Solutions, Inc. | Method to construct a high-assurance IPSec gateway using an unmodified commercial implementation |
-
2012
- 2012-01-09 CN CN201210006291.6A patent/CN102571281B/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101267277A (en) * | 2008-04-30 | 2008-09-17 | 西安电子科技大学 | Anti-eavesdropping and anti-pollution network coding method |
| CN101714910A (en) * | 2009-11-20 | 2010-05-26 | 西安电子科技大学 | Anti-pollution network encoding method based on probability detection |
| CN102208976A (en) * | 2011-07-21 | 2011-10-05 | 北京邮电大学 | Coding vector encryption based secure network coding method |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102571281A (en) | 2012-07-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN102208976B (en) | Coding vector encryption based secure network coding method | |
| KR101387799B1 (en) | Encryption method for message authentication | |
| US8239680B2 (en) | Secret communication method and secret communication device thereof | |
| JP6740902B2 (en) | Authentication encryption method, authentication decryption method, and information processing apparatus | |
| CN112787807B (en) | Quantum communication method and communication network based on secure relay | |
| KR102304831B1 (en) | Encryption systems and method using permutaion group based cryptographic techniques | |
| CN109274502B (en) | Method and device for creating public key encryption and key signature and readable storage medium | |
| CN102664740B (en) | Remote-authorization-based bidding document encryption and decryption method | |
| CN104468097A (en) | Security data communication achieving method based on quantum key distribution | |
| CN114244507A (en) | Quantum direct communication method, device, equipment and system based on single-path transmission | |
| CN101707767A (en) | A data transmission method and device | |
| CN108075879A (en) | The method, apparatus and system of a kind of data encryption and decryption | |
| CN101179374B (en) | Communication equipment, communications system and method therefor | |
| CN116506024A (en) | Communication method for quantum direct communication and quantum direct communication system | |
| CN114499857A (en) | Method for realizing data correctness and consistency in big data quantum encryption and decryption | |
| CN114793167A (en) | Network coding method, system and device based on block encryption and threshold sharing | |
| CN104967518A (en) | Method for improving information transmission security | |
| TWI487308B (en) | Method for quantum communication | |
| CN102571281B (en) | A kind of secure network coding and transmission method and device that uses cache node | |
| US20100014670A1 (en) | One-Way Hash Extension for Encrypted Communication | |
| CN110932863A (en) | A Code-Based Generalized Signcryption Method | |
| WO2023145379A1 (en) | Secure communication system and method based on network encryption | |
| CN102427399B (en) | Secure network coding method for optical networks based on source information encryption | |
| Jin et al. | Low transmission overhead for polar coding physical-layer encryption | |
| Tavernier et al. | Ciphering of Telemetry over IP–Performances on UDP |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant |