期刊文献+

移动网络通信信息传输准确性保护预测仿真 被引量:5

Simulation of Protection Accuracy Prediction of Mobile Network Communication Information Transmission
下载PDF
导出
摘要 对移动网络通信信息传输的准确性进行保护,能够有效提高通信过程的安全稳定性。对你通信信息传输的保护,首先需要对信息入侵进行预测,设计隐含子群问题的抗量子计算模型,完成通信信息的准确传输。传统方法将原始信息映射为2个混沌矩阵,并对其进行置乱处理,但忽略了信息的入侵预测,导致信息传输准确性较差。提出具有抗量子计算攻击的移动网络通信信息传输准确性保护预测方法。组建入侵信息预测体制,对基于经典的HSP隐含子群问题进行扩展,设计基于非HSP隐含子群问题的抗量子计算模型,给出信息的不可攻击性,由此进行移动网络入侵信息预测。实验结果证明,所提方法具备抵抗量子计算的天然优势,可以有效地保证数据信息的机密性和完整性。 Protecting the accuracy of the information transmission of mobile network communication can effectively improve the security and stability in the process of communication. Traditionally, the method maps the original infor- mation to two chaotic matrices, but ignores the prediction of information intrusion, resulting in low accuracy of infor- mation transmission. A method for predicting the accuracy of information transmission in mobile network communica- tion with anti-quantum computation attack is proposed. The prediction system of intrusion information is built. The hidden subgroup based on classical lISP is extended. The anti-quantum computing model of hidden subgroup problem based on non-HSP is designed to give inaccessibility of information, thus the intrusion information in mobile network is predicted. Experimental results prove that the proposed method has the natural advantage which is resistant to quantum computation. It can effectively ensure the confidentiality and completeness of data information.
出处 《计算机仿真》 北大核心 2018年第3期407-410,共4页 Computer Simulation
关键词 移动网络 通信信息 传输准确性 Mobile network Communication information Transmission accuracy
  • 相关文献

参考文献10

二级参考文献174

  • 1梁杰,来学嘉.Improved Collision Attack on Hash Function MD5[J].Journal of Computer Science & Technology,2007,22(1):79-87. 被引量:12
  • 2方萃浩,叶修梓,彭维,张引.协同环境下CAD模型的多层次动态安全访问控制[J].软件学报,2007,18(9):2295-2305. 被引量:16
  • 3曹晓梅,韩志杰,陈贵海.基于流量预测的传感器网络拒绝服务攻击检测方案[J].计算机学报,2007,30(10):1798-1805. 被引量:33
  • 4方萃浩,叶修梓,陈志杨,彭维.三维CAD特征模型的多分辨率造型[J].浙江大学学报(工学版),2007,41(12):1955-1961. 被引量:3
  • 5Armbrust M, Fox A, Griffith R, et al. Above the clouds: A Berkeley view of cloud computing [EB/OL]. [2014-07-02]. http://x-integrate, de/x-in-cms, nsf]id/DE Von Regenmachern und Wolkenbruechen _-_ Impact _ 2009 _ Nachlese/MYMfile/ abovetheclouds, pdf.
  • 6Harauz J, Kaufman L M, Potter B. Data security in the world of cloud computing [J]. IEEE Security & Privacy, 2009, 7(4): 61-64.
  • 7McMillan R. Cloud computing a ' security nightmare', says Cisco CEO [EB/OL]. [ 2014- 07 -02 ]. http://www. networkworld, comnews/2009/042309-cloud-computing-a- security-nightmare, html.
  • 8Virvilis N, Dritsas S, Gritzalis D. Secure cloud storage; Available infrastructures and architectures review and evaluation [G] //LNCS 6863". Proc of Trust, Privacy and Security in Digital Business. Berlin~ Springer, 2011, 74-85.
  • 9Rivest R, Adleman L, Dertouzos M. On data banks and privacy homomorphisms [J]. Foundations of Secure Computation, 1978, 4(11)~ 169-180.
  • 10Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems [J]. Communications of the ACM, 1978, 21(2) : 120-126.

共引文献90

同被引文献52

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部