Method for detecting random linear network coding tampering data in spatial information network

A random linear, network coding technology, applied in the field of secure communication, can solve problems such as increasing node computing overhead and reducing network performance, and achieves the effect of reducing the number of tampering detections, shortening the transmission distance, and reducing the search time.

Inactive Publication Date: 2016-12-07
NORTHEASTERN UNIV +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology helps prevent unauthorized access or manipulation by analyzing how well each piece of software works on various networks with varying degrees of security measures. It uses certain rules for ensuring they are secure against attacks from outside sources like hackers or viruses. These checks help identify any potential issues before sending sensitive material over them. By doing this, it saves money while also improving efficiency.

Problems solved by technology

This patented technical problem addressed in this patents relates to improving space communication networks' efficiency and security without requiring extra equipment such as routers that consume too much power. Random Linear Network Coding (RNC) was developed specifically for use on Spatial Information Nets but its limitations include potential vulnerabilities against attacks like forgery. Therefore there needs a better way to detect unauthorized codes from spatios between different types of connections within the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting random linear network coding tampering data in spatial information network
  • Method for detecting random linear network coding tampering data in spatial information network
  • Method for detecting random linear network coding tampering data in spatial information network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] An embodiment of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0040] The method for detecting tampered data with random linear network coding in the spatial information network of this embodiment, such as figure 1 shown, including the following steps:

[0041] Step 1: In the spatial information network, the source node, that is, the source spacecraft node, calculates the homomorphic hash function value of the source message, and forwards the source message and its homomorphic hash function value together by means of random linear network coding;

[0042] In this embodiment, random linear network coding is used to code the data transmitted by the spatial information network, so that the network reaches the maximum transmission flow limit. In this embodiment, a directed graph G=(V, E) is used to represent the space information network, where V is the set of all spacecraft nodes in the space information network, and

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for detecting random linear network coding tampering data in a spatial information network, relating to the technical field of safety communication of spatial information networks. A source spacecraft node calculates a homomorphic hash function value of a source message, and forwards the source message together with the homomorphic hash function value of the source message in a random linear network coding manner; data packets needing to be subjected to tampering detection are determined self-adaptively; and tampering detection of the data packets needing to be subjected to tampering detection is carried out, so that tampered data packets are found, and abandoned. According to the method disclosed by the invention, tampering detection probabilities of the data packets and the nodes are configured according to different network environments; due to inter-node cooperation, the two tampering detection probabilities are automatically adjusted; the nodes and the data packets needing to be subjected to tampering detection are self-adaptively determined according to the two tampering detection probabilities; therefore, the data packet tampering detection time can be reduced; the transmission distance of a polluted message is shortened; and in addition, specific tampered information in the data packets is found by adopting a binary search method, so that the search time can be obviously reduced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products