首页 | 本学科首页   官方微博 | 高级检索  
     

基于改进网络编码的匿名通信机制研究
引用本文:杨康,翟江涛,戴跃伟.基于改进网络编码的匿名通信机制研究[J].计算机应用研究,2020,37(1):236-238.
作者姓名:杨康  翟江涛  戴跃伟
作者单位:江苏科技大学 电子信息学院,江苏 镇江212003;江苏科技大学 电子信息学院,江苏 镇江212003;江苏科技大学 电子信息学院,江苏 镇江212003
基金项目:江苏省自然科学基金;中央高校基本科研业务费专项;国家科技支撑计划;国家自然科学基金
摘    要:针对现有基于网络编码的匿名系统,由于转发节点的不稳定性以及匿名消息的多路径转发,使得数据发送的成功率较低的问题,提出了一种基于网络编码与数据冗余方法的新匿名通信机制ACSNC(anonymous communication system based on network coding)。首先采用数据冗余机制对要发送的数据进行冗余分片,并沿多条路径发送;然后中间转发节点对信息进行随机编码后转发,使信息通过节点前后的统计特性发生变化;最后,目的节点根据收到的数据片与编码系数恢复匿名信息。仿真结果表明,该机制在显著提高数据发送成功率的基础上,能够有效地保障通信的匿名性与安全性。

关 键 词:匿名通信  网络编码  数据冗余  多路径  网络安全
收稿时间:2018/6/19 0:00:00
修稿时间:2019/11/24 0:00:00

Anonymous communication mechanism based on improved network coding
Yang Kang,Zhai Jiangtao and Dai Yuewei.Anonymous communication mechanism based on improved network coding[J].Application Research of Computers,2020,37(1):236-238.
Authors:Yang Kang  Zhai Jiangtao and Dai Yuewei
Affiliation:Jiangsu University of Science and Technology,,
Abstract:In the existing anonymous system based on network coding, the success rate of data transmission is low due to the instability of forwarding nodes and the multipath forwarding of anonymous messages. Aiming at this problem, this paper proposed a new anonymous communication mechanism ACSNC based on network coding and data redundancy method. This mechanism first adopted a data redundancy mechanism to redundantly fragment the data and send it along multiple paths. Then, the intermediate forwarding node randomly encoded the information and old forward the information to change the statistical characteristics while information was passing through the node. Finally, the destination node recovered the anonymous information based on the received data slice and coding coefficients. Simulation results show that the mechanism can effectively guarantee the anonymity and security of communication on the basis of significantly improving the success rate of data transmission.
Keywords:anonymous communication  network coding  data redundancy  multipath  network security
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号