An Efficient Dynamic Authentication Scheme for Secure Network Coding

Network coding based applications are notoriously susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. However, existing packets authentication schemes for network coding either incur high computation overhead, or are vulnerable to arbitrary collusion among attackers. In this paper, we proposed a novel dynamic authentication scheme for secure network coding by dynamically using the linear vector subspaces of network coding. The scheme can efficiently detect packets generated by pollution attackers, and effectively resist arbitrary collusion among attackers. Our work is an innovative dynamic solution to frustrate pollution attacks with arbitrary collusion among attackers, and authentication cost can be further reduced by employing batch authentication in participating nodes. In addition, our scheme provides an efficient packet authentication without requiring the existence of any extra secure channel. Security analysis and simulations results demonstrate the practicality and efficiency of our scheme. DOI:  http://dx.doi.org/10.11591/telkomnika.v11i5.2470

[1]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[2]  João Barros,et al.  Lightweight Security for Network Coding , 2008, 2008 IEEE International Conference on Communications.

[3]  Haider M. AlSabbagh,et al.  Performance Analysis for Bit Error Rate of DS- CDMA Sensor Network Systems with Source Coding , 2012 .

[4]  Hao Wu,et al.  Efficient network coding-based multicast retransmission mechanism for mobile communication networks , 2012, IET Commun..

[5]  Yong Guan,et al.  An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks , 2009, IEEE INFOCOM 2009.

[6]  Minghua Chen,et al.  RIPPLE Authentication for Network Coding , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Nipun Bansal,et al.  Peer to Peer Networking and Applications , 2013 .

[8]  Reza Curtmola,et al.  Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.

[9]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[10]  Tracey Ho,et al.  Resilient Network Coding in the Presence of Byzantine Adversaries , 2007, INFOCOM.

[11]  Frank R. Kschischang,et al.  Universal weakly secure network coding , 2009, 2009 IEEE Information Theory Workshop on Networking and Information Theory.

[12]  Mohammad Mehdi Ebadzadeh,et al.  Dynamic Particle Swarm Optimization for Multimodal Function , 2012 .

[13]  Fumiyuki Adachi,et al.  Power Efficient Adaptive Network Coding in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[14]  T. Ho,et al.  On Linear Network Coding , 2010 .

[15]  Fang Zhao,et al.  Signatures for Content Distribution with Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.

[16]  Baochun Li,et al.  Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.

[17]  Tracey Ho,et al.  Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[18]  Frank R. Kschischang,et al.  Coding for Errors and Erasures in Random Network Coding , 2007, IEEE Transactions on Information Theory.

[19]  Christos Gkantsidis,et al.  Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.