Secure efficient routing based on network coding in the delay tolerant networks

The Delay/Disruption Tolerant Network (DTN) is characterized with long delay, high bit-error rate, intermittent connectivity and frequent partitions. Due to this, network coding is introduced to improve its transmission performance significantly. Numerous DTN routing algorithms based on network coding have been developed. However, they are susceptible to various malicious attacks. In this paper, we propose a new kind of networking scheme suitable to the DTN, which can resist the eavesdropping attacks to a certain extant. Firstly, we establish a DTN network model based on the packet path optimization allocation algorithm and redefine the packet format to meet the algorithm requirements. Meanwhile, to resist the dropping attacks, the source node dynamically adds redundancy factors at the certain time. Then the pollution attacks and the data tampering attacks can almost be resisted by means of mutual authentication between intermediate nodes. This approach avoids the traditional anti-tampering attack algorithm over-reliant on the source node. The security analysis and simulation results show that our scheme can effectively resist the joint attacks and optimize the network performance.

[1]  Meng Wu,et al.  Secure multipath routing based on secret sharing in mobile ad hoc networks , 2009, 2009 IEEE International Conference on Network Infrastructure and Digital Content.

[2]  Jonathan Katz,et al.  Signing a Linear Subspace: Signature Schemes for Network Coding , 2009, IACR Cryptol. ePrint Arch..

[3]  Tracey Ho,et al.  Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[4]  B. Sundar Rajan,et al.  Convolutional Codes for Network-Error Correction , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[5]  Muriel Médard,et al.  Random Linear Network Coding: A free cipher? , 2007, 2007 IEEE International Symposium on Information Theory.

[6]  Boleslaw K. Szymanski,et al.  On Secure Multi-Copy Based Routing in Compromised Delay Tolerant Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[7]  George Danezis,et al.  Introducing Traffic Analysis , 2007 .

[8]  Kevin R. Fall,et al.  A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.

[9]  Yong Guan,et al.  An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.