An efficient signature-based scheme for securing network coding against pollution attacks

被引:0
|
作者
Yu, Zhen [1 ]
Wei, Yawen [1 ]
Ramkumar, Bhuvaneswari [1 ]
Guan, Yong [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding provides the possibility to maximize network throughput and receives various applications in traditional computer networks, wireless sensor networks and peer-to-peer systems. However, the applications built on top of network coding are vulnerable to pollution attacks, in which the compromised forwarders can inject polluted or forged messages into networks. Existing schemes addressing pollution attacks either require an extra secure channel or incur high computation overhead. In this paper, we propose an efficient signature-based scheme to detect and filter pollution attacks for the applications adopting linear network coding techniques. Our scheme exploits a novel homomorphic signature function to enable the source to delegate its signing authority to forwarders, that is, the forwarders can generate the signatures for their output messages without contacting the source. This nice property allows the forwarders to verify the received messages, but prohibit them from creating the valid signatures for polluted or forged ones. Our scheme does not need any extra secure channels, and can provide source authentication and batch verification. Experimental results show that it can improve computation efficiency up to ten times compared to some existing one. In addition, we present an alternate lightweight scheme based on a much simpler linear signature function. This alternate scheme provides a tradeoff between computation efficiency and security.
引用
收藏
页码:2083 / 2091
页数:9
相关论文
共 50 条
  • [1] An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks
    Yu, Zhen
    Wei, Yawen
    Ramkumar, Bhuvaneswari
    Guan, Yong
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 406 - 414
  • [2] An Efficient Short Null Keys Based Scheme for Securing Network Coding Against Pollution Attacks
    Wang, Junsheng
    Wang, Jin
    Zhu, Yanqin
    Jia, Chengjin
    FRONTIERS IN INTERNET TECHNOLOGIES, 2015, 502 : 16 - 31
  • [3] SECURE NETWORK CODING BASED ON HOMOMORPUIC SIGNATURE AGAINST POLLUTION ATTACKS
    Cheng, Zhen
    Chi, Kaikai
    Tian, Xianzhong
    Li, Yanjun
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1092 - 1096
  • [4] Securing network coding against pollution attacks based on space and time properties
    He, Ming
    Wang, Hong
    Chen, Lin
    Gong, Zhenghu
    Dai, Fan
    Liu, Zhihong
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 2086 - 2090
  • [5] Securing Network Coding Architectures Against Pollution Attacks With Band Codes
    Fiandrotti, Attilio
    Gaeta, Rossano
    Grangetto, Marco
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) : 730 - 742
  • [6] Homomorphic MAC-Based Scheme against Pollution Attacks in Network Coding
    ZHANG Yujie
    CAI Ying
    LI Zhuo
    FAN Yanfang
    Wuhan University Journal of Natural Sciences, 2013, 18 (05) : 435 - 442
  • [7] Reputation-based defense scheme against pollution attacks on network coding
    Wang T.
    Cai Y.
    Zhang Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (11): : 2491 - 2499
  • [8] Securing Coding-Based Cloud Storage Against Pollution Attacks
    Anglano, Cosimo
    Gaeta, Rossano
    Grangetto, Marco
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2017, 28 (05) : 1457 - 1469
  • [9] A Commitment-based Scheme for Securing Vandermonde Codes against Pollution Attacks
    Sun, Hung-Min
    Chang, Shih-Ying
    Chiao, Hsin-Ta
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2009), 2009, : 591 - +
  • [10] Efficient Codeguard Mechanism Against Pollution Attacks in Interflow Network Coding
    Krithiga, J.
    Porselvi, R. C.
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,