期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
A Lightweight Secure Network Coding Scheme against Wiretapping 被引量:3
1
作者 LIU Guangjun LIU Ximeng +1 位作者 XIONG Jinbo ZHOU Hang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第2期156-160,共5页
Existing works for securing network coding against wiretapping either incur high coding complexity or bring large bandwidth overhead. For exploiting the lightweight security mechanism for resource-constrained networks... Existing works for securing network coding against wiretapping either incur high coding complexity or bring large bandwidth overhead. For exploiting the lightweight security mechanism for resource-constrained networks, an efficient secure coding scheme is proposed in conjunction with the inherent mix- ing characteristic of network coding. The key idea is to minimize the randomizing operations to the entire plaintext data. The pro- posed scheme is shown to have properties of lightweight security complexity and lower communication overhead compared with the existing traditional solutions, and can be easy in implementation and combination with classical cryptography techniques. 展开更多
关键词 network coding security wiretapping algebraic coding pseudo-random function
原文传递
Efficient Schemes for Securing Network Coding Against Wiretapping 被引量:2
2
作者 LIU Guangjun ZHOU Hang 《Wuhan University Journal of Natural Sciences》 CAS 2013年第4期355-362,共8页
Existing solutions for secure network coding either bring significant bandwidth overhead or incur a high computational complexity. For exploiting low-overhead mechanism for secure network coding against wiretapping, t... Existing solutions for secure network coding either bring significant bandwidth overhead or incur a high computational complexity. For exploiting low-overhead mechanism for secure network coding against wiretapping, three efficient schemes are proposed for the applications with different security requirements. The basic idea behind this paper is first to encrypt a small part of source vectors and then subject the remaining original source vectors and the encrypted vectors to a special linear transformation. Also, a lightweight version of this scheme is then presented for resource-constrained networks. Moreover, an extensive scheme with enhanced security is also considered. All proposals are shown to have properties of lower security complexity and smaller bandwidth usage compared with the existing solutions. Also, the proposals can be easy to achieve flexible levels of security for various applications. 展开更多
关键词 network coding SECURITY wiretapping pseudorandom function ENCRYPTION
原文传递
高斯Wiretap模型下基于部分陪集的无线物理层强安全编码 被引量:1
3
作者 易鸣 季新生 +2 位作者 黄开枝 钟州 郭淑明 《电子与信息学报》 EI CSCD 北大核心 2014年第4期780-786,共7页
针对无线物理层安全编码不能保证信息在有噪信道下进行强安全传输的问题,该文提出一种基于部分陪集的强安全编码方法。首先证明了当且仅当陪集母码的对偶码的最小汉明距离大于信息泄露位数时,利用部分陪集编码能够保证信息的强安全传输... 针对无线物理层安全编码不能保证信息在有噪信道下进行强安全传输的问题,该文提出一种基于部分陪集的强安全编码方法。首先证明了当且仅当陪集母码的对偶码的最小汉明距离大于信息泄露位数时,利用部分陪集编码能够保证信息的强安全传输;然后证明了陪集编码的一系列性质,基于这些性质可以将陪集间最小汉明距离计算降低为1次查表运算,进而设计了一种基于树形深度优先的最大可用陪集集合搜索算法;最后分析得出一些典型线性分组码的抗窃听信道信息泄露和抗合法信道传输噪声的能力,以及相应的最大可用陪集集合。当陪集母码为BCH(15,11)的对偶码时,与传统陪集编码方案相比,该方法对合法信道的信道质量要求降低了5 dB,同时能够保证信息传输的强安全性。 展开更多
关键词 强安全编码 无线物理层 高斯Wiretap 陪集
下载PDF
FTN传输条件下极化码帧间物理层安全结构设计
4
作者 张晨宇 刘荣科 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2018年第10期2217-2223,共7页
极化码是适用于物理层wiretap信道安全模型的一种编码方式,针对在超奈奎斯特(FTN)条件下传输的极化码,设计了一种无需获知窃听信道信噪比(SNR)的帧间链式加密的安全结构。通过混淆结构将对合法接收端可靠而对非法窃听端阻塞的码元进行扩... 极化码是适用于物理层wiretap信道安全模型的一种编码方式,针对在超奈奎斯特(FTN)条件下传输的极化码,设计了一种无需获知窃听信道信噪比(SNR)的帧间链式加密的安全结构。通过混淆结构将对合法接收端可靠而对非法窃听端阻塞的码元进行扩散,利用物理层主信道和窃听信道的差异,在每一帧中生成主信道可译而窃听信道不可译的密钥序列,对下一帧进行加密,实现安全容量的帧间传输。仿真结果显示,在FTN加速场景和窃听信道SNR相对于主信道波动的前提下,提出的极化码帧间安全结构可在wiretap信道的平均信道退化程度为0 d B时实现信息的安全传输。 展开更多
关键词 极化码 wiretap信道 超奈奎斯特(FTN) 物理层 帧间安全结构
原文传递
Low Transmission Overhead for Polar Coding Physical-Layer Encryption 被引量:1
5
作者 Hongxu Jin Rongke Liu Chenyu Zhang 《China Communications》 SCIE CSCD 2019年第2期246-256,共11页
In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap channel(WTC) model. To decrease transmission overhead of the shared secret information and enhanc... In this paper, for physical-layer security(PLS), a novel scheme of polar coding encryption is introduced in the wiretap channel(WTC) model. To decrease transmission overhead of the shared secret information and enhance the security performance against an attacker, we have employed the two following encryption technologies: Firstly, randomization of output bits is not dependent on the traditional randomized bit-channels but they are directly flipped through the random bit sequence. Secondly, for employing Advanced Encryption Standard(AES), we utilize the secret seed to extend an initial secret key of AES cryptosystem, which it appears a good avalanche performance. Result analyses demonstrate that the proposed scheme is strongly resistant against conventional attacks. 展开更多
关键词 WIRETAP channel polar codes physical-layer security CRYPTOGRAPHY attack
下载PDF
Physical Layer Security in MIMO Wiretap Channels with Antenna Correlation 被引量:4
6
作者 Gangcan Sun Zhuo Han +2 位作者 Jingbo Jiao Zhongyong Wang Dagang Wang 《China Communications》 SCIE CSCD 2017年第8期149-156,共8页
To investigate the impact of antenna correlation on secrecy performance in MIMO wiretap channels with Nakagami-m fading, the expressions of secrecy outage probability and positive secrecy probability were derived. Div... To investigate the impact of antenna correlation on secrecy performance in MIMO wiretap channels with Nakagami-m fading, the expressions of secrecy outage probability and positive secrecy probability were derived. Diversity order and array gain were also achieved for further insight. The study was based on the information theory that physical layer security can be guaranteed when the quality of the main channel is higher than that of the eavesdropper's channel. Monte Carlo simulations well validated the numerical results of analytic expressions. It was shown that antenna correlation is detrimental to secrecy performance when average SNR of the main channel is at medium and high level. Interestingly, when average SNR of the main channel reduces to low level, the effect of antenna correlation becomes benefi cial to secrecy performance. 展开更多
关键词 physical layer security antenna correlation wiretap channels outage probability Nakagami-m fading
下载PDF
网络性能的监控与管理——关于WireTap的分析与研究
7
作者 刘皓霜 《中国纺织大学学报》 CSCD 1998年第6期41-45,共5页
围绕如何对整个企业网络的性能进行监控与管理这一问题,着重介绍了网络性能监控与管理工具WireTap的各种性能参数,并对其各个功能模块作了深入的讨论.
关键词 企业网络 网络监控 服务请求 WIRETAP 网络管理
下载PDF
Enhancing secrecy rates in a wiretap channel
8
作者 Shahid M.Shah Vinod Sharma 《Digital Communications and Networks》 SCIE 2020年第1期129-135,共7页
Reliable communication imposes an upper limit on the achievable rate,namely the Shannon capacity.Wyner's wiretap coding ensures a security constraint and reliability,but results in a decrease of achievable rate.To... Reliable communication imposes an upper limit on the achievable rate,namely the Shannon capacity.Wyner's wiretap coding ensures a security constraint and reliability,but results in a decrease of achievable rate.To mitigate the loss in secrecy rate,we propose a coding scheme in which we use sufficiently old messages as key and prove that multiple messages are secure with respect to all the information possessed by the eavesdropper.We also show that we can achieve security in the strong sense.Next,we study a fading wiretap channel with full channel state information of the eavesdropper's channel and use our coding/decoding scheme to achieve a secrecy capacity close to the Shannon capacity of the main channel(in the ergodic sense).Finally,we study a case where the transmitter does not have instantaneous information of the channel state of the eavesdropper,but only its distribution. 展开更多
关键词 Physical layer security Rate loss Secret key Wiretap channel Secrecy capacity
下载PDF
Secrecy rate analysis of dual-hop AF relay wiretap channel
9
作者 丁飞 Song Aiguo +1 位作者 Li Jianqing Wu Zhenyang 《High Technology Letters》 EI CAS 2014年第4期390-394,共5页
An amplify-and-forward(AF) dual-hop relay is proposed for secure communication within Wyner s wiretap channel.Based on an information-theoretic formulation,the average secrecy rate is characterized when two legitimate... An amplify-and-forward(AF) dual-hop relay is proposed for secure communication within Wyner s wiretap channel.Based on an information-theoretic formulation,the average secrecy rate is characterized when two legitimate partners communicate over a quasi-static fading channel.Theoretical analysis and simulation results show that both cooperative strategies of average power scaling(APS) and instantaneous power scaling(IPS) are proved to be able to achieve information-theoretic security,and eavesdropper is unable to decode any information. 展开更多
关键词 secrecy rate information-theoretic security amplify-and-forward (AF) dual-hop RELAY wiretap channel
下载PDF
An Efficient Construction of Secure Network Coding
10
作者 ZHANG Jing-li TANG Ping MA Song-ya 《Chinese Quarterly Journal of Mathematics》 2016年第1期60-68,共9页
Under the assumption that the wiretapper can get at most r(r < n) independent messages, Cai et al. showed that any rate n multicast code can be modified to another secure network code with transmitting rate n- r by... Under the assumption that the wiretapper can get at most r(r < n) independent messages, Cai et al. showed that any rate n multicast code can be modified to another secure network code with transmitting rate n- r by a properly chosen matrix Q^(-1). They also gave the construction for searching such an n × n nonsingular matrix Q. In this paper, we find that their method implies an efficient construction of Q. That is to say, Q can be taken as a special block lower triangular matrix with diagonal subblocks being the(n- r) ×(n- r)and r × r identity matrices, respectively. Moreover, complexity analysis is made to show the efficiency of the specific construction. 展开更多
关键词 secure network coding global encoding kernel local encoding kernel WIRETAP block lower triangular matrix
下载PDF
Security Analysis of Subspace Network Coding
11
作者 Yantao Liu Yasser Morgan 《Journal of Information Security》 2018年第1期85-94,共10页
This paper analyzed the security of constant dimensional subspace code against wiretap attacks. The security was measured in the probability with which an eavesdropper guessed the source message successfully. With the... This paper analyzed the security of constant dimensional subspace code against wiretap attacks. The security was measured in the probability with which an eavesdropper guessed the source message successfully. With the methods of linear algebra and combinatorics, an analytic solution of the probability was obtained. Performance of subspace code was compared to several secure network coding schemes from the perspective of security, flexibility, complexity, and independence, etc. The comparison showed subspace code did not have perfect security, but it achieved probabilistic security with low complexity. As a result, subspace code was suitable to the applications with limited computation and moderate security requirement. 展开更多
关键词 NETWORK Security WIRETAP ATTACKS SUBSPACE Code NETWORK Coding
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部