An efficient signature-based scheme for securing network coding against pollution attacks

被引:0
|
作者
Yu, Zhen [1 ]
Wei, Yawen [1 ]
Ramkumar, Bhuvaneswari [1 ]
Guan, Yong [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding provides the possibility to maximize network throughput and receives various applications in traditional computer networks, wireless sensor networks and peer-to-peer systems. However, the applications built on top of network coding are vulnerable to pollution attacks, in which the compromised forwarders can inject polluted or forged messages into networks. Existing schemes addressing pollution attacks either require an extra secure channel or incur high computation overhead. In this paper, we propose an efficient signature-based scheme to detect and filter pollution attacks for the applications adopting linear network coding techniques. Our scheme exploits a novel homomorphic signature function to enable the source to delegate its signing authority to forwarders, that is, the forwarders can generate the signatures for their output messages without contacting the source. This nice property allows the forwarders to verify the received messages, but prohibit them from creating the valid signatures for polluted or forged ones. Our scheme does not need any extra secure channels, and can provide source authentication and batch verification. Experimental results show that it can improve computation efficiency up to ten times compared to some existing one. In addition, we present an alternate lightweight scheme based on a much simpler linear signature function. This alternate scheme provides a tradeoff between computation efficiency and security.
引用
收藏
页码:2083 / 2091
页数:9
相关论文
共 50 条
  • [41] On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks
    K. Nirmal Raja
    M. Marsaline Beno
    Journal of Medical Systems, 2014, 38
  • [42] On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks
    Raja, K. Nirmal
    Beno, M. Marsaline
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
  • [43] Signature-Based Top-k Query Processing against Data Replacement Attacks in MANETs
    Tsuda, Takuji
    Komai, Yuka
    Hara, Takahiro
    Nishio, Shojiro
    2015 IEEE 34TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2015, : 130 - 139
  • [44] Fast Signature Scheme for Network Coding
    Yang, Mingxi
    Yan, Wenjie
    Fang, Huajing
    JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2012, 6 (01) : 17 - 33
  • [45] FAST SIGNATURE SCHEME FOR NETWORK CODING
    Yang Ming-xi
    Yan Wen-jie
    Fang Hua-jing
    DCABES 2009: THE 8TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, PROCEEDINGS, 2009, : 410 - 414
  • [46] Secure Network Coding Against Intra/Inter-Generation Pollution Attacks
    Liu Guangjun
    Wang Bin
    CHINA COMMUNICATIONS, 2013, 10 (08) : 100 - 110
  • [47] Secret Error-Correcting Network Coding against Eavesdropping and Pollution Attacks
    Chen, Siguang
    Wu, Meng
    Lu, Weifeng
    ADVANCED MATERIALS AND ENGINEERING MATERIALS, PTS 1 AND 2, 2012, 457-458 : 1499 - +
  • [48] A Tag Encoding Scheme against Pollution Attack to Linear Network Coding
    Wu, Xiaohu
    Xu, Yinlong
    Yuen, Chau
    Xiang, Liping
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 33 - 42
  • [49] Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic
    Tahmi, Omar
    Talhi, Chamseddine
    Challal, Yacine
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 : 423 - 440
  • [50] A CVP-BASED LATTICE SIGNATURE SCHEME FOR NETWORK CODING
    Shang, Tao
    Pei, Hengli
    Liu, Jianwei
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2014, 10 (01): : 317 - 327