An Efficient Short Null Keys Based Scheme for Securing Network Coding Against Pollution Attacks

نویسندگان

  • Junsheng Wang
  • Jin Wang
  • Yanqin Zhu
  • Chengjin Jia
چکیده

Network coding has gained wide attention nowadays for its significant advantages on many aspects compared with traditional routing mechanism. However, if there are malicious nodes launching pollution attacks by tampering or forging data packets in the communication network, the sink nodes will suffer from failure decoding, together with serious results such as bandwidth wasting, longer transmission delay and increasing computation overheads. The original null keys based pollution detection scheme cannot efficiently defend against pollution attacks when the system has colluding attackers because of high communication overheads. Therefore, we firstly define the concept of complete null space, with the property that no pollution packets can pass its verification. We then propose the idea of partial position detection and design an algorithm to construct short null keys. Secondly, we provide a short null keys based pollution detection scheme with network coding, which has lower overheads compared with the original null keys based pollution detection scheme in composing complete null space. Finally, rigorous theoretical proofs are given to analyze the security of the designed scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SNKC: An Efficient On-the-fly Pollution Detection Scheme for Content Distribution with Linear Network Coding

Linear network coding (LNC) has attracted significant attention because it has the potential to achieve the throughput capacity of a network. However, transmission systems with LNC are vulnerable to pollution attacks in which normal packets will be corrupted by malicious relay nodes and participate in normal encoding process. The null keys based error detection schemes have been designed to eff...

متن کامل

An Efficient Hybrid Cryptographic Scheme for Wireless Sensor Network with Network Coding

Wireless sensor network (WSN) using network coding is vulnerable to pollution attacks. Existing authentication schemes addressing this attack either burden the sensor node with a higher computation overhead, or fail to provide an efficient way to mitigate two recently reported attacks: tag pollution attacks and repetitive attacks, which makes them inapplicable to WSN. This paper proposes an eff...

متن کامل

A Novel Homomorphic Against Intersession Coding attacks Using InterMac

Network coding allows intermediate nodes to encode data packets, which increases network throughput and enhances robustness. However, once the node injects corrupted data blocks into a network, the polluted data blocks will propagate quickly with network coding. In the existing approach a new homomorphic MAC scheme called SpaceMac, which makes it possible for an intermediate node validating whe...

متن کامل

An Efficient Key Pre - distribution Scheme for Multiple Attacks

Probabilistic Key pre-distribution schemes (P-KPSs) are candidates for securing interactions between resource limited computer networks. Collusion susceptible P-KPSs are trade-offs between security and complexity and security include resistance to passive eavesdropping attacks, and active message injection attacks. The existing work presented the P-KPS, the subset keys and identity tickets (SKI...

متن کامل

An Efficient Dynamic Authentication Scheme for Secure Network Coding

Network coding based applications are notoriously susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. However, existing packets authentication schemes for network coding either incur high computation overhead, or are vulnerable to arbitrary collusion among attackers. In this paper, w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014