Homomorphic signatures for Network Coding
نویسندگان
چکیده
Network coding allows intermediate nodes to mix data in order to achieve higher throughput and better reliability. Hence, nodes combine multiple packets into a single packet before forwarding it. Such scheme needs efficient authentication and integrity mechanisms in order to prevent pollution attacks whereby an attacker injects bogus messages into the system instead of network coded blocks. Such an attack has the potential impact of infecting all subsequent message exchanges between nodes that received polluted messages. In this paper, we propose SigNCode, a new integrity mechanism based on homomorphic operations allowing an on-the-fly verification of the integrity of a network coded packet and therefore preventing pollution attacks. Thanks to this new mechanism, any intermediate node is capable of constructing a correct signature for a linear combination of messages originating from the source. The proposed mechanism is based on the use of bilinear pairings and relies on a single communication channel. In order to evaluate the security of our signature scheme we also developed a new security definition and a proof model that encompass the extended integrity notion underlying network coding. This definition and the model help distinguish some legitimate forgery such as linear combinations of original data blocks from pure forgery such as injection of bogus data.
منابع مشابه
Homomorphic Network Coding Signatures in the Standard Model
Network coding is known to provide improved resilience to packet loss and increased throughput. Unlike traditional routing techniques, it allows network nodes to perform transformations on packets they receive before transmitting them. For this reason, packets cannot be authenticated using ordinary digital signatures, which makes it difficult to hedge against pollution attacks, where malicious ...
متن کاملSecure Network Coding over the Integers
Network coding offers the potential to increase throughput and improve robustness without any centralized control. Unfortunately, network coding is highly susceptible to “pollution attacks” in which malicious nodes modify packets improperly so as to prevent message recovery at the recipient(s); such attacks cannot be prevented using standard endto-end cryptographic authentication because networ...
متن کاملSignatures for Network Coding
In communication networks, files commonly are separated into data packets and transmitted from the source node to a prescribed set of destination nodes by a method known as “store and forward”, in which data packets received are stored and then forwarded to the next node. Network coding has been proposed to replace the traditional “store and forward” model, and to improve the throughput and rob...
متن کاملAuthenticating Computation on Groups: New Homomorphic Primitives and Applications
In this paper we introduce new primitives to authenticate computation on data expressed as elements in (cryptographic) groups. As for the case of homomorphic authenticators, our primitives allow to verify the correctness of the computation without having to know of the original data set. More precisely, our contributions are two-fold. First, we introduce the notion of linearly homomorphic authe...
متن کاملSignatures for Multi-source Network Coding
We consider the problem of securing inter-flow network coding with multiple sources. We present a practical homomorphic signature scheme that makes possible to verify network coded packets composed of data originating from different sources. The multi-source signature scheme allows to circumvent the need of a secret key shared by all sources. Our solution is an extension of the pairing based ho...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010