网络编码的安全性综述
Survey on Security of Network Coding

作者: 张宇阳 , 杨保峰 , 张倩倩 :解放军理工大学通信工程学院,江苏 南京; 高媛媛 :南京邮电大学,江苏 南京; 顾耀坤 :65040部队,辽宁 沈阳;

关键词: 网络编码安全熵攻击拜占庭攻击污染攻击窃听攻击万能攻击信息论密码学Network Coding Security Entropy Attack Byzantine Attack Pollution Attack Eavesdropping Attack Universal Attack Informationism Cryptology

摘要:
本文是针对网络编码的安全性问题的综述性文章,首先对现有的针对网络编码系统的恶意攻击进行了细致的定义和分类,总结了各类恶意攻击之间的联系和区别,说明了它们的基本防御思想;其次针对各类恶意攻击,阐述了一些经典的网络编码防御方案,并分析其优缺点;最后对现有的网络编码防御方案进行了总结并提出了改进思路。

Abstract: In this paper, we mainly summarize secure problems of network coding. Firstly, existing malicious attacks are discussed in detailed definition and classification, and then we describe the relationship and difference among them and point out the basic defense thought of all kinds of malicious attacks. Secondly, aiming at all kinds of malicious attacks, we introduce some classic network coding defense schemes and analyze their advantages and disadvantages. Finally, we summarize existing network coding defense schemes and propose some improvement ideas.

文章引用: 张宇阳 , 高媛媛 , 杨保峰 , 张倩倩 , 顾耀坤 (2015) 网络编码的安全性综述。 无线通信, 5, 126-137. doi: 10.12677/HJWC.2015.56018

参考文献

[1] Ahlswede, R., Cai, N. and Yeung, R.W. (2000) Network Information Flow. IEEE Transactions on Information Theory, 46, 1204-1216.
http://dx.doi.org/10.1109/18.850663

[2] Yao, S.X., Chen, J., et al. (2014) A Survey of Security Network Coding toward Various Attacks. 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, 24-26 September 2014, 252-259.
http://dx.doi.org/10.1109/TrustCom.2014.35

[3] He, M., Chen, L., et al. (2012) Survey on Secure Transmission of Network Coding in Wireless Networks. 2012 International Conference on Computer Science and Service System, Nanjing, 11-13 August 2012, 1216-1219.
http://dx.doi.org/10.1109/CSSS.2012.308

[4] Christos, G. and Pablo, R. (2006) Cooperative Security for Net-work Coding File Distribution. Infocom, 3, 5.

[5] Jiang, Y.-X., Fan, Y.-F., Xue, M., et al. (2009) A Self-Adaptive Probabilistic Packet Filter Scheme against Entropy Attacks in Network Coding. Computer Networks, 53, 3089-3101.
http://dx.doi.org/10.1016/j.comnet.2009.08.002

[6] Newell, A.J., Curtmola, R. and Nita-Rotaru, C. (2012) En-tropy Attacks and Countermeasures in Wireless Network Coding. Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York, 16-18 April 2012, 185-196.
http://dx.doi.org/10.1145/2185448.2185473

[7] Cai, N. and Yeung, R.W. (2002) Network Coding and Error Correction. IEEE Information Theory Workshop, Bangalore, 20-25 October 2002, 119-122.

[8] Zhang, Z. (2006) Network Error Correction Coding in Packetized Networks. IEEE Information Theory Workshop, Chengdu, 433-437.
http://dx.doi.org/10.1109/itw2.2006.323836

[9] Zhang, Z. (2008) Linear Network Error Correction Codes in Packet Networks. IEEE Transactions on Information Theory, 54, 209-218.
http://dx.doi.org/10.1109/TIT.2007.909139

[10] Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D. and Medard, M. (2007) Resilient Network Coding in the Presence of Byzantine Adversaries. 26th IEEE International Conference on Computer Communications, Anchorage, 6-12 May 2007, 616-624.
http://dx.doi.org/10.1109/INFCOM.2007.78

[11] Pandit, V., Jun, J.H. and Agrawal, D.P. (2011) Inherent Security Benefits of Analog Network Coding for the Detection of Byzantine Attacks in Multi-Hop Wireless Networks. Pro-ceedings of the 2011 IEEE 8th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Valencia, 17-21 October 2011, 697-702.

[12] Li, Q., Lui, J.C.S. and Chiu, D.-M. (2012) On the Security and Efficiency of Content Distribution via Network Coding. IEEE Transactions on Dependable and Secure Computing, 9, 211-221.

[13] Bin, D., Zhang, S., Qu, Y., Yang, J. and Wang, F. (2010) Orthogonal Vector Based Network Coding against Pollution Attacks in n-Layer Combination Networks. Proceedings of the 5th International ICST Conference on Communications and Networking in China (CHINACOM), Beijing, 22-25 August 2010, 1-5.

[14] Cai, N. and Yeung, R.W. (2002) Secure Network Coding. Proceedings of the IEEE International Symposium on Information Theory, Lausanne, 30 June-5 July 2002, 323.

[15] Cai, N. and Yeung, R.W. (2011) Secure Network Coding on a Wiretap Network. IEEE Transactions on Information Theory, 57, 424-435.
http://dx.doi.org/10.1109/TIT.2010.2090197

[16] Cai, N. and Chan, T. (2011) Theory of Secure Network Coding. Proceedings of the IEEE, 99, 421-437.
http://dx.doi.org/10.1109/JPROC.2010.2094592

[17] Bhattad, K. and Narayanan, K.R. (2005) Weakly Secure Network Coding. Proceedings of the First Workshop on Network Coding, Theory, and Applications, Riva del Garda, 7 April 2005, 281-285.

[18] Capar, C. and Goeckel, D. (2012) Network Coding for Facilitating Secrecy in Large Wireless Networks. Proceedings of the 46th Annual Conference on Information Sciences and Systems (CISS), Princeton, 21-23 March 2012, 1-6.

[19] Zhang, P., Jiang, Y., Lin, C., Fan, Y. and Shen, X. (2010) P-Coding: Secure Network Coding against Eavesdropping Attacks. Proceedings of the IEEE INFOCOM, San Diego, 14-19 March 2010, 1-9.

[20] 武萌, 吴蒙. 防窃听的弱安全网络编码[J]. 计算机技术与发展, 2014, 24(10): 167-169.

[21] 赵佳佳, 任平安. 基于抗窃听和拜占庭攻击的随机网络编码[J]. 计算机科学, 2014, 41(9): 174-177.

[22] 徐光宪, 付晓. 抗万能攻击的安全网络编码[J]. 计算机科学, 2012, 39(8): 88-91.

[23] 杨柳, 钟诚. 一种高效的安全数据包过滤算法[J]. 兰州大学学报(自然科学版), 2012, 48(4): 105-108.

分享
Top