Secure network coding method merged with timestamp and homomorphic signature

被引:6
|
作者
机构
[1] Pei, Heng-Li
[2] Shang, Tao
[3] Liu, Jian-Wei
来源
Pei, H.-L. | 1600年 / Editorial Board of Journal on Communications卷 / 34期
关键词
Network security - Codes (symbols) - Wireless networks - Pollution - Authentication;
D O I
10.3969/j.issn.1000-436x.2013.04.004
中图分类号
学科分类号
摘要
A secure network coding method merged with timestamp and homomorphic signature which can solve security issues in wireless multi-hop networks was proposed. The timestamp into RSA-based homomorphic signature scheme was brought and used to produce random coefficients of network coding, thus made it possible to defend pollution attacks and replay attacks simultaneously while maintaining the homomorphic property of the signature. The analysis that mainly focus on was the influence of random coefficients on decoding probability of network coding and security of the proposed scheme. Results indicate that the proposed scheme can defend pollution attacks and replay attacks simultaneously, and the ratio of overhead between RSA-based homomorphic signature scheme and the proposed scheme is approximates 1.
引用
收藏
相关论文
共 50 条
  • [31] FedNC: A Secure and Efficient Federated Learning Method with Network Coding
    Shi, Yuchen
    Zhu, Zheqi
    Fan, Pingyi
    Letaief, Khaled B.
    Peng, Chenghui
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [32] Secure Network Coding on a Wiretap Network
    Cai, Ning
    Yeung, Raymond W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (01) : 424 - 435
  • [33] Secure Network Coding in DTNs
    Laszlo Czap
    Istvan Vajda
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (01) : 28 - 30
  • [34] Theory of Secure Network Coding
    Cai, Ning
    Chan, Terence
    PROCEEDINGS OF THE IEEE, 2011, 99 (03) : 421 - 437
  • [35] Secure Communication with Network Coding
    Cao, Zhanghua
    Tang, Yuansheng
    Luo, Jinquan
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 31 - 34
  • [36] On the Optimality of Secure Network Coding
    Guang, Xuan
    Lu, Jiyong
    Fu, Fang-Wei
    IEEE COMMUNICATIONS LETTERS, 2015, 19 (07) : 1165 - 1168
  • [37] Secure Noisy Network Coding
    Yassaee, Mohammad Hossein
    Aref, Mohammad Reza
    Gohari, Amin
    2013 IRAN WORKSHOP ON COMMUNICATION AND INFORMATION THEORY (IWCIT), 2013,
  • [38] Secure Communication with Network Coding
    Cao, Zhanghua
    Tang, Yuansheng
    Luo, Jinquan
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT C, 2012, 24 : 1943 - 1950
  • [39] Security Protection Method for Electronic Archives Based on Homomorphic Aggregation Signature Scheme in Mobile Network
    Li, Junwei
    Su, Huaquan
    Guo, Li
    Wang, Wanshuo
    Yang, Yongjiao
    Wen, You
    Li, Kai
    Mo, Pingyan
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2025, 35 (01)
  • [40] Linearly Homomorphic Signature Based Secure Computation Outsourcing in Vehicular Adhoc Networks
    Vasudha
    Altaf, Fahiem
    Maity, Soumyadev
    2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,