Efficient Authentication Based on Orthogonality and Timeliness for Network Coding

Network coding provides a new data transmission paradigm for network protocols. However, the packets-mixture nature makes network coding systems notoriously susceptible to pollution attacks. Previous security solutions will incur high computation and transmission overhead, and they will be worse when facing malicious collusion attacks. In this paper, we propose an efficient authentication scheme, which allows participating nodes to efficiently detect corrupted packets based on orthogonality and timeliness. Our work is the first orthogonality and timeliness based solution to frustrate pollution attacks with arbitrary collusion. The security analysis shows that polluted packets can pass our authentication scheme with a very low probability. We also present simulations of our scheme, and results demonstrate the practicality and efficiency of our scheme.

[1]  Christos Gkantsidis,et al.  Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[2]  Xuemin Shen,et al.  An Integrated Stimulation and Punishment Mechanism for Thwarting Packet Dropping Attack in Multihop Wireless Networks , 2011, IEEE Transactions on Vehicular Technology.

[3]  Fang Zhao,et al.  Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.

[4]  Baochun Li,et al.  Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.

[5]  Fumiyuki Adachi,et al.  Power Efficient Adaptive Network Coding in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[6]  Frank R. Kschischang,et al.  Coding for Errors and Erasures in Random Network Coding , 2008, IEEE Trans. Inf. Theory.

[7]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[8]  Minghua Chen,et al.  RIPPLE Authentication for Network Coding , 2010, 2010 Proceedings IEEE INFOCOM.

[9]  Frank R. Kschischang,et al.  Universal weakly secure network coding , 2009, 2009 IEEE Information Theory Workshop on Networking and Information Theory.

[10]  Wanjiun Liao,et al.  Congestion-Aware Network-Coding-Based Opportunistic Routing in Wireless Ad Hoc Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.