An efficient signature-based scheme for securing network coding against pollution attacks

被引:0
|
作者
Yu, Zhen [1 ]
Wei, Yawen [1 ]
Ramkumar, Bhuvaneswari [1 ]
Guan, Yong [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding provides the possibility to maximize network throughput and receives various applications in traditional computer networks, wireless sensor networks and peer-to-peer systems. However, the applications built on top of network coding are vulnerable to pollution attacks, in which the compromised forwarders can inject polluted or forged messages into networks. Existing schemes addressing pollution attacks either require an extra secure channel or incur high computation overhead. In this paper, we propose an efficient signature-based scheme to detect and filter pollution attacks for the applications adopting linear network coding techniques. Our scheme exploits a novel homomorphic signature function to enable the source to delegate its signing authority to forwarders, that is, the forwarders can generate the signatures for their output messages without contacting the source. This nice property allows the forwarders to verify the received messages, but prohibit them from creating the valid signatures for polluted or forged ones. Our scheme does not need any extra secure channels, and can provide source authentication and batch verification. Experimental results show that it can improve computation efficiency up to ten times compared to some existing one. In addition, we present an alternate lightweight scheme based on a much simpler linear signature function. This alternate scheme provides a tradeoff between computation efficiency and security.
引用
收藏
页码:2083 / 2091
页数:9
相关论文
共 50 条
  • [21] An Authentication Code Against Pollution Attacks in Network Coding
    Oggier, Frederique
    Fathi, Hanane
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (06) : 1587 - 1596
  • [22] An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding
    Zhang, Yudi
    Jiang, Yan
    Li, Bingbing
    Zhang, Mingwu
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 524 - 531
  • [23] An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems
    Alireza Esfahani
    Georgios Mantas
    Hélio Silva
    Jonathan Rodriguez
    Jose Carlos Neves
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [24] An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems
    Esfahani, Alireza
    Mantas, Georgios
    Silva, Helio
    Rodriguez, Jonathan
    Neves, Jose Carlos
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [25] A Deep Detection Scheme against Pollution Attacks in Wireless Inter-flow Network Coding
    Shang, Tao
    Huang, Fuhua
    Peng, Tianli
    Liu, Jianwei
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 102 - 106
  • [26] An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
    Fan, Yanfei
    Jiang, Yixin
    Zhu, Haojin
    Shen, Xuemin
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2213 - 2221
  • [27] Securing Wireless Network Coding against Pollution Attack at the Physical Layer
    Kim, Sang Wu
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [28] An efficient dynamic-identity based signature scheme for secure network coding
    Jiang, Yixin
    Zhu, Haojin
    Shi, Minghui
    Shen, Xuemin
    Lin, Chuang
    COMPUTER NETWORKS, 2010, 54 (01) : 28 - 40
  • [29] Towards Effective Defense against Pollution Attacks on Network Coding
    Zhu, Donghai
    Yang, Xinyu
    Yu, Wei
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [30] Practical Defenses Against Pollution Attacks in Wireless Network Coding
    Dong, Jing
    Curtmola, Reza
    Nita-Rotaru, Cristina
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)