Security overhead of random linear network coding in multicast relay networks

被引:4
作者
Maboudi, Behnaz [1 ]
Pahlevani, Peyman [1 ]
机构
[1] Inst Adv Studies Basic Sci, Comp Sci & Informat Technol, Zanjan, Iran
关键词
ANALYTICAL-MODEL; MAC SCHEME; AUTHENTICATION; PERFORMANCE; CODES;
D O I
10.1002/ett.3974
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The relays in random linear network coding (RLNC) approach recode and transmit the coded packets to boost the performance against packet loss. However, this can endanger the system to pollution attacks, which can be eliminated by Homomorphic message authentication code (HMAC). Cache coding limits RLNC by coding only the decoded packets in the relays. In the other words, the relay node in cache coding first decodes the coded packets, then recodes and protects them by a MAC-based scheme that allows the next hop to discover the pollution in the network. This study provides analytical models for cache coding and RLNC to compare their communication overhead. First, we approximate the number of transmissions in a network consisting several relays. The approximation models are for the cases of a few and large number of relays. Then, we validate our analysis using simulation results and illustrate that cache coding can eliminate the pollution attack issue of RLNC with only a slight increase in the bandwidth usage when there are no malicious nodes in the network. Moreover, we conclude that it is more beneficial to employ the cache coding approach at the presence of malicious nodes in the network.
引用
收藏
页数:17
相关论文
共 31 条
  • [1] Homomorphic MACs: MAC-Based Integrity for Network Coding
    Agrawal, Shweta
    Boneh, Dan
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 292 - +
  • [2] Network information flow
    Ahlswede, R
    Cai, N
    Li, SYR
    Yeung, RW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1204 - 1216
  • [3] [Anonymous], 2018, INT C BROADB COMM NE
  • [4] Chachulski S., 2007, Trading structure for randomness in wireless opportunistic routing, V37
  • [5] RKA Security for Identity-Based Signature Scheme
    Chang, Jinyong
    Wang, Huiqun
    Wang, Fei
    Zhang, Anling
    Ji, Yanyan
    [J]. IEEE ACCESS, 2020, 8 : 17833 - 17841
  • [6] Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC
    Chang, Jinyong
    Shao, Bilin
    Zhang, Anling
    Bian, Genqing
    Ji, Yanyan
    Xu, Maozhi
    [J]. IEEE ACCESS, 2019, 7 : 88393 - 88398
  • [7] General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding
    Chang, Jinyong
    Ji, Yanyan
    Xu, Maozhi
    Xue, Rui
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 : 416 - 425
  • [8] Decoding Delay Performance of Random Linear Network Coding for Broadcast
    Chatzigeorgiou, Ioannis
    Tassi, Andrea
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (08) : 7050 - 7060
  • [9] An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    Neves, Jose Carlos
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (06) : 627 - 639
  • [10] Dual-Homomorphic Message Authentication Code Scheme for Network Coding-Enabled Wireless Sensor Networks
    Esfahani, Alireza
    Yang, Du
    Mantas, Georgios
    Nascimento, Alberto
    Rodriguez, Jonathan
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,