Performance Evaluation of Secure Network Coding Using Homomorphic Signature

Network coding has gained significant attention by improving throughput and reliability in disruptive MANETs. Yet, it is vulnerable to attacks from malicious nodes. In order to prevent malicious attacks, we have explored the use of secure network coding schemes based on homomorphic properties of cryptographic systems. While homomorphic methods, especially those based on public key cryptography, provide strong protection against both external and internal attacks, they do increase processing overhead as they require complex cryptographic operations (e.g., exponentiation, multiplication, modular operations). The goal of this paper is two fold: assess the feasibility of implementing Homomorphic Network Coding in an off-the-shelf laptop/smartphone platform, and evaluate the processing and delay performance when such implementations are deployed in a simple network scenario. To this end, we have implemented in LINUX an RSA-based homomorphic algorithm which exhibits very competitive processing efficiency as compared with published (public-key) schemes. For the LINUX implementation we have measured the processing delay for various flow and parameter settings. We have then integrated the homomorphic processing model (with associated O/H) in a MANET network simulator. Using this simulator, we have evaluated the performance of secure network coding under various network conditions and have compared it with other secure network coding schemes. We conclude the paper with a discussion of secure coding feasibility and cost for different application scenarios.

[1]  Hugo Krawczyk,et al.  Quantitative Evaluation of Secure Network Coding using Homomorphic Signature / Hashing , 2011 .

[2]  Christos Gkantsidis,et al.  Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[3]  Athina Markopoulou,et al.  Locating Byzantine Attackers in Intra-Session Network Coding Using SpaceMac , 2010, 2010 IEEE International Symposium on Network Coding (NetCod).

[4]  Paulo S. L. M. Barreto,et al.  Pairing-Friendly Elliptic Curves of Prime Order , 2005, Selected Areas in Cryptography.

[5]  Ning Cai,et al.  Network error correction , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..

[6]  Ethan L. Miller,et al.  An experimental analysis of cryptographic overhead in performance-critical systems , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[7]  Dan Boneh,et al.  Homomorphic MACs: MAC-Based Integrity for Network Coding , 2009, ACNS.

[8]  Ning Cai,et al.  Network coding and error correction , 2002, Proceedings of the IEEE Information Theory Workshop.

[9]  Tommy Färnqvist Number Theory Meets Cache Locality – Efficient Implementation of a Small Prime FFT for the GNU Multiple Precision Arithmetic Library , 2005 .

[10]  Fang Zhao,et al.  Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.

[11]  Muriel Médard,et al.  Codecast: a network-coding-based ad hoc multicast protocol , 2006, IEEE Wireless Communications.

[12]  K. Jain,et al.  Practical Network Coding , 2003 .

[13]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[14]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[16]  Donald F. Towsley,et al.  Bounds on the Gain of Network Coding and Broadcasting in Wireless Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[17]  Baochun Li,et al.  How Practical is Network Coding? , 2006, 200614th IEEE International Workshop on Quality of Service.

[18]  Sachin Katti,et al.  Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM 2007.

[19]  Reza Curtmola,et al.  Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.

[20]  Jonathan Katz,et al.  Signing a subspace: Signatures for network coding , 2009 .

[21]  Frank Mueller,et al.  Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.

[22]  Rong Luo,et al.  Cryptography Overhead Evaluation and Analysis for Wireless Sensor Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[23]  Dawn Xiaodong Song,et al.  Homomorphic Signature Schemes , 2002, CT-RSA.

[24]  Jonathan Katz,et al.  Secure Network Coding Over the Integers , 2010, IACR Cryptol. ePrint Arch..

[25]  Christos Gkantsidis,et al.  Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[26]  Joong Bum Rhim,et al.  Fountain Codes , 2010 .

[27]  M. Gerla,et al.  Network Coding Multicast Performance When Some Nodes Do Not Code , 2009 .

[28]  Kamal Jain,et al.  Signatures for Network Coding , 2006 .

[29]  Giovanni Pau,et al.  Code torrent: content distribution using network coding in VANET , 2006, MobiShare '06.