An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks

被引:25
作者
Esfahani, Alireza [1 ]
Mantas, Georgios [1 ]
Rodriguez, Jonathan [1 ]
Neves, Jose Carlos [1 ]
机构
[1] Campus Univ Santiago, IT, P-3810193 Aveiro, Portugal
关键词
Network coding; Security; Data pollution attack; Tag pollution attack; Wireless networks; AUTHENTICATION;
D O I
10.1007/s10207-016-0351-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent research efforts have shown that wireless networks can benefit from network coding (NC) technology in terms of bandwidth, robustness to packet losses, delay and energy consumption. However, NC-enabled wireless networks are susceptible to a severe security threat, known as data pollution attack, where a malicious node injects into the network polluted packets that prevent the destination nodes from decoding correctly. Due to recoding, occurred at the intermediate nodes, according to the core principle of NC, the polluted packets propagate quickly into other packets and corrupt bunches of legitimate packets leading to network resource waste. Hence, a lot of research effort has been devoted to schemes against data pollution attacks. Homomorphic MAC-based schemes are a promising solution against data pollution attacks. However, most of them are susceptible to a new type of pollution attack, called tag pollution attack, where an adversary node randomly modifies tags appended to the end of the transmitted packets. Therefore, in this paper, we propose an efficient homomorphic message authentication code-based scheme, called HMAC, providing resistance against data pollution attacks and tag pollution attacks in NC-enabled wireless networks. Our proposed scheme makes use of three types of homomorphic tags (i.e., MACs, D-MACs and one signature) which are appended to the end of the coded packet. Our results show that the proposed HMAC scheme is more efficient compared to other competitive tag pollution immune schemes in terms of complexity, communication overhead and key storage overhead.
引用
收藏
页码:627 / 639
页数:13
相关论文
共 30 条
[1]   Homomorphic MACs: MAC-Based Integrity for Network Coding [J].
Agrawal, Shweta ;
Boneh, Dan .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 :292-+
[2]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[3]  
[Anonymous], 1998, GRAD TEXT M
[4]   Secure network coding [J].
Cai, N ;
Yeung, RW .
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, :323-323
[5]   Multicast security: A taxonomy and some efficient constructions [J].
Canetti, R ;
Garay, J ;
Itkis, G ;
Micciancio, D ;
Naor, M ;
Pinkas, B .
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, :708-716
[6]   Trading structure for randomness in wireless opportunistic routing [J].
Chachulski, Szymon ;
Jennings, Michael ;
Katti, Sachin ;
Katabi, Dina .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) :169-180
[7]  
Charles Denis, 2009, International Journal of Information and Coding Theory, V1, P3, DOI 10.1504/IJICOT.2009.024044
[8]   TESLA-Based Homomorphic MAC for Authentication in P2P System for Live Streaming with Network Coding [J].
Cheng, Chi ;
Jiang, Tao ;
Zhang, Qian .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :291-298
[9]  
CHOU PA, 2003, 41 ANN ALL C COMM CO
[10]   Dual-Homomorphic Message Authentication Code Scheme for Network Coding-Enabled Wireless Sensor Networks [J].
Esfahani, Alireza ;
Yang, Du ;
Mantas, Georgios ;
Nascimento, Alberto ;
Rodriguez, Jonathan .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,