دانلود مقاله ISI انگلیسی شماره 152843
ترجمه فارسی عنوان مقاله

یک برنامه حفظ حریم خصوصی کارآمد برای برنامه نویسی امن شبکه بر اساس حساسیت فشرده

عنوان انگلیسی
An efficient privacy-preserving scheme for secure network coding based on compressed sensing
کد مقاله سال انتشار تعداد صفحات مقاله انگلیسی
152843 2017 28 صفحه PDF
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : AEU - International Journal of Electronics and Communications, Volume 79, September 2017, Pages 33-42

ترجمه کلمات کلیدی
برنامه نویسی شبکه، حفظ حریم خصوصی، سنجش فشرده، حمله آلودگی،
کلمات کلیدی انگلیسی
Network coding; Privacy-preserving; Compressed sensing; Pollution attack;
پیش نمایش مقاله
پیش نمایش مقاله  یک برنامه حفظ حریم خصوصی کارآمد برای برنامه نویسی امن شبکه بر اساس حساسیت فشرده

چکیده انگلیسی

Network coding (NC) provides an elegant solution for improving capacity and robustness in computer networks. Different to traditional “store-and-forward” transmission paradigm, each intermediate node linearly combines received data packets, and the original files can be decoded at the sink nodes in NC settings. This brand-new paradigm is vulnerable to pollution attack, which means that some malicious nodes inject fake data packets into the network and this will lead to incorrect decoding. There are some information-theoretical solutions and cryptographic solutions for solving this security issue, and most existing schemes can thwart data pollution attacks. However, the privacy of the original files are vital to some application environments (e.g. military network). To the best of our knowledge, there is not a secure scheme which can thwart pollution attack and can protect the privacy of transmitted data simultaneously. In this paper, we present an efficient privacy-preserving scheme for secure network coding based on compressed sensing (CS), which has attracted considerable research interest in the signal processing community. Specifically, we embed CS into the general NC framework, i.e., the source node needs to compress each original data packet using the sensing matrix before creating the augmented vector and the sink nodes require to perform an additional CS reconstruction algorithm for reconstructing the original file. In addition, we construct a simple key distribution protocol and each intermediate node just needs two secret keys for verifying the integrity of received data packets. Such novel hybrid construction enables the privacy-preserving guarantee, and the performance comparison shows the high-efficiency of our scheme in terms of the computational complexity and communication overhead.