Font Size: a A A

Research On Location Mechanism Of Malicious Nodes In Network Coding

Posted on:2021-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y YuFull Text:PDF
GTID:2428330614458400Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Network encoding technology allows the encoding node to encode the packets received and forward the encoding packet,and the sink can use the encoding packet received and the existing packets to decode the requested packets at the same time,which can effectively improve the network transmission effectiveness.Network coding technology gains the improvement of network transmission efficiency by the computation cost of the encoding node,and the network encoding node becomes the key node and vulnerable node of the system.At present,the relevant researches focus on the detection of pollution information,but ignore the effective positioning of pollution sources,resulting in the pollution sources that can not be removed in time,and pollution information that continues to be generated.In order to further improve the transmission reliability and effectiveness,the research on the location of malicious nodes in secure network coding is worth studying further.Firstly,aiming at the problem of high total delay caused by signature verification in the process of pollution information detection,a probabilistic public-key verification scheme for locating malicious coding nodes with low delay is proposed.Signature verification is performed at a certain layer distance,which reduces the total time overhead of the system to verify the legitimacy of information.At the same time,the random error and malicious information in the transmission process are distinguished by the checksum verification mechanism,which reduces the startup probability of the malicious node positioning mechanism.Meanwhile,the scheme constructs the suspicious subspace of the malicious node and reduces the total cost of the system during the malicious node positioning process.Experimental comparison shows that the total time delay of the system is lower than that of the traditional pollution information detection scheme under the premise of ensuring safety.Secondly,aiming at the optimization of the communication overhead between nodes in the process of pollution information detection,the improvement of the confidentiality of the broadcast data in the collaboration process,and the optimization of the execution efficiency of the malicious node localization process,a random verification of malicious node localization is further proposed.The scheme is controlled by the parameters maintained by the data packets and the network nodes respectively,and the random verification scheme of the signature algorithm becomes more flexible and adaptable.At the same time,the content of collaborative communication between nodes is performed hash function operation,and the security and the delay of the pollution information detection stage are demonstrated,and the communication overhead of the malicious node location phase is discussed.The analysis and comparison results show that under the premise of ensuring security,the total delay of the system in the pollution information detection phase is lower than that of the traditional pollution information detection scheme,and the overhead required in the malicious node location phase is also lower than that of the comparison scheme.
Keywords/Search Tags:pollution information, malicious nodes, signature verification, suspicious subregions
PDF Full Text Request
Related items