作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程

• 安全技术 • 上一篇    下一篇

基于Cat-Logistic模型的安全网络编码方法研究

徐光宪,高嵩,华一阳   

  1. (辽宁工程技术大学电子与信息工程学院,辽宁 葫芦岛 125105)
  • 收稿日期:2014-09-24 出版日期:2015-09-15 发布日期:2015-09-15
  • 作者简介:徐光宪(1977-),男,教授,主研方向:网络编码,信息处理;高嵩,硕士研究生;华一阳,本科生。
  • 基金资助:
    辽宁省高等学校杰出青年学者成长计划基金资助项目(LJQ2012029)。

Research on Secure Network Coding Method Based on Cat-Logistic Model

XU Guangxian,GAO Song,HUA Yiyang   

  1. (College of Electrical and Information Engineering,Liaoning Technical University,Huludao 125105,China)
  • Received:2014-09-24 Online:2015-09-15 Published:2015-09-15

摘要: 在Cat-Logistic模型的基础上提出一种安全网络编码方法。构造Cat-Logistic映射模型,根据该模型生成三级密钥信息,对密钥信息进行迭代处理,通过取余的方式将密文信息传送给随机数生成器,产生种子秘钥增强编码的安全性。加密数据经过混沌系统生成加密信息,运用信宿列表译码算法将接收到的数据信息整合成信源密文,利用混沌序列解密得到原始信息。理论分析与仿真实验结果表明,该方法对多种窃听和污染攻击具有较强的抵抗能力。

关键词: 安全网络编码, Cat映射, 改进型Logistic映射, 混沌序列, 列表译码

Abstract: This paper presents a secure network coding method which is based on Cat-Logistic model.A Cat-Logistic mapping model is given,three secret key information is generated by the model,the key information is processed iteratively,this paper takes the remainder of the encrypted information and transmits it to a random number generator which generates secret key of seeds to enhance security code.Encrypted data generates encrypted information through the chaotic system.List decoding algorithm is used to integrate the receiving data in order to obtain the encrypted information of sources.The original information is obtained by chaotic sequence decryption process.Theoretical analysis and simulation experimental result shows that this method has strong ability to resist on a variety of eavesdropping and pollution attack.

Key words: secure network coding, Cat mapping, advanced Logistic maping, chaotic sequence, list-decoding

中图分类号: