An efficient signature-based scheme for securing network coding against pollution attacks

被引:0
作者
Yu, Zhen [1 ]
Wei, Yawen [1 ]
Ramkumar, Bhuvaneswari [1 ]
Guan, Yong [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
来源
27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5 | 2008年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding provides the possibility to maximize network throughput and receives various applications in traditional computer networks, wireless sensor networks and peer-to-peer systems. However, the applications built on top of network coding are vulnerable to pollution attacks, in which the compromised forwarders can inject polluted or forged messages into networks. Existing schemes addressing pollution attacks either require an extra secure channel or incur high computation overhead. In this paper, we propose an efficient signature-based scheme to detect and filter pollution attacks for the applications adopting linear network coding techniques. Our scheme exploits a novel homomorphic signature function to enable the source to delegate its signing authority to forwarders, that is, the forwarders can generate the signatures for their output messages without contacting the source. This nice property allows the forwarders to verify the received messages, but prohibit them from creating the valid signatures for polluted or forged ones. Our scheme does not need any extra secure channels, and can provide source authentication and batch verification. Experimental results show that it can improve computation efficiency up to ten times compared to some existing one. In addition, we present an alternate lightweight scheme based on a much simpler linear signature function. This alternate scheme provides a tradeoff between computation efficiency and security.
引用
收藏
页码:2083 / 2091
页数:9
相关论文
共 50 条
[41]   On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks [J].
K. Nirmal Raja ;
M. Marsaline Beno .
Journal of Medical Systems, 2014, 38
[42]   On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks [J].
Raja, K. Nirmal ;
Beno, M. Marsaline .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
[43]   Signature-Based Top-k Query Processing against Data Replacement Attacks in MANETs [J].
Tsuda, Takuji ;
Komai, Yuka ;
Hara, Takahiro ;
Nishio, Shojiro .
2015 IEEE 34TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2015, :130-139
[44]   Fast Signature Scheme for Network Coding [J].
Yang, Mingxi ;
Yan, Wenjie ;
Fang, Huajing .
JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2012, 6 (01) :17-33
[45]   FAST SIGNATURE SCHEME FOR NETWORK CODING [J].
Yang Ming-xi ;
Yan Wen-jie ;
Fang Hua-jing .
DCABES 2009: THE 8TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, PROCEEDINGS, 2009, :410-414
[46]   Secure Network Coding Against Intra/Inter-Generation Pollution Attacks [J].
Liu Guangjun ;
Wang Bin .
CHINA COMMUNICATIONS, 2013, 10 (08) :100-110
[47]   Secret Error-Correcting Network Coding against Eavesdropping and Pollution Attacks [J].
Chen, Siguang ;
Wu, Meng ;
Lu, Weifeng .
ADVANCED MATERIALS AND ENGINEERING MATERIALS, PTS 1 AND 2, 2012, 457-458 :1499-+
[48]   A Tag Encoding Scheme against Pollution Attack to Linear Network Coding [J].
Wu, Xiaohu ;
Xu, Yinlong ;
Yuen, Chau ;
Xiang, Liping .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :33-42
[49]   Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic [J].
Tahmi, Omar ;
Talhi, Chamseddine ;
Challal, Yacine .
FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 :423-440
[50]   A CVP-BASED LATTICE SIGNATURE SCHEME FOR NETWORK CODING [J].
Shang, Tao ;
Pei, Hengli ;
Liu, Jianwei .
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2014, 10 (01) :317-327