An efficient signature-based scheme for securing network coding against pollution attacks

被引:0
|
作者
Yu, Zhen [1 ]
Wei, Yawen [1 ]
Ramkumar, Bhuvaneswari [1 ]
Guan, Yong [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding provides the possibility to maximize network throughput and receives various applications in traditional computer networks, wireless sensor networks and peer-to-peer systems. However, the applications built on top of network coding are vulnerable to pollution attacks, in which the compromised forwarders can inject polluted or forged messages into networks. Existing schemes addressing pollution attacks either require an extra secure channel or incur high computation overhead. In this paper, we propose an efficient signature-based scheme to detect and filter pollution attacks for the applications adopting linear network coding techniques. Our scheme exploits a novel homomorphic signature function to enable the source to delegate its signing authority to forwarders, that is, the forwarders can generate the signatures for their output messages without contacting the source. This nice property allows the forwarders to verify the received messages, but prohibit them from creating the valid signatures for polluted or forged ones. Our scheme does not need any extra secure channels, and can provide source authentication and batch verification. Experimental results show that it can improve computation efficiency up to ten times compared to some existing one. In addition, we present an alternate lightweight scheme based on a much simpler linear signature function. This alternate scheme provides a tradeoff between computation efficiency and security.
引用
收藏
页码:2083 / 2091
页数:9
相关论文
共 50 条
  • [31] An Efficient Edge-Based Authentication for Network Coding Against Entropy Attacks
    Iguchi, Ryo
    Manabe, Yoshifumi
    2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2014, : 133 - 139
  • [32] A New Signature-Based Indexing Scheme for Efficient Trajectory Retrieval in Spatial Networks
    Chang, Jae-Woo
    Um, Jung-Ho
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (06): : 1240 - 1249
  • [33] Cooperative defense against pollution attacks in network coding using SpaceMac
    Computer Science Department, University of California, Irvine, CA, United States
    不详
    IEEE J Sel Areas Commun, 2 (442-449):
  • [34] Continuous-Variable Quantum Network Coding Against Pollution Attacks
    Shang, Tao
    Li, Ke
    Chen, Ranyiliu
    Liu, Jianwei
    QUANTUM TECHNOLOGY AND OPTIMIZATION PROBLEMS, 2019, 11413 : 196 - 206
  • [35] On the Practicality of Cryptographic Defences Against Pollution Attacks in Wireless Network Coding
    Newell, Andrew
    Dong, Jing
    Nita-Rotaru, Cristina
    ACM COMPUTING SURVEYS, 2013, 45 (03)
  • [36] Intra-Session Linear Network Coding Against Pollution Attacks
    Han X.-D.
    Gao F.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2018, 38 (11): : 1182 - 1187and1204
  • [37] Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac
    Le, Anh
    Markopoulou, Athina
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (02) : 442 - 449
  • [38] An efficient and secure quantum blind signature-based electronic cash transaction scheme
    Gupta, Aman
    Chandra, Gunja Venkat
    Das, Nayana
    Paul, Goutam
    IET QUANTUM COMMUNICATION, 2024, 5 (04): : 619 - 631
  • [39] Limits of signature-based detection of buffer overflow attacks
    Kim, S
    Wee, K
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 288 - 293
  • [40] Signature-Based Protection from Code Reuse Attacks
    Kayaalp, Mehmet
    Schmitt, Timothy
    Nomani, Junaid
    Ponomarev, Dmitry
    Abu Ghazaleh, Nael
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) : 533 - 546