ERSS-RLNC: Efficient and robust secure scheme for random linear network coding

Random Linear Network Coding (RLNC) is a promising technology of Network Coding (NC) that has been proved to be both sufficient and efficient. To enable the deployment of RLNC in real networks, this paper first introduces a new efficient and flexible authentication-encryption scheme that is immune to Byzantine and eavesdropping attacks. The proposed scheme achieves simultaneously information confidentiality, packet integrity and source authentication with minimum computational complexity and memory consumption. It also presents a new technique for constructing an integer Global Encoding Matrix (GEM) that satisfies the inversion property in a dynamic manner. In addition, the proposed scheme uses dynamic keys to ensure robustness against attacks. Secondly, an efficient implementation of Binary RLNC, suitable for battery constrained mobile devices with low computational capabilities such as mobile phones and sensors, is defined. The effectiveness of the coding process is proved by modifying the Galois field of calculation from integer (int8, int16) to binary. Not only does this ensure low computational requirements, high throughput and low energy consumption, but also reduces the statistical characteristics of the coding process. The obtained theoretical and experimental results show that the new scheme is secure and efficient compared with many recent works in this field.

[1]  M. Medard,et al.  An information-theoretic cryptanalysis of network coding - is protecting the code enough? , 2008, 2008 International Symposium on Information Theory and Its Applications.

[2]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[3]  M. Gerla,et al.  Performance of Network Coding in Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[4]  Yuansheng Tang,et al.  Secure Communication with Network Coding , 2012 .

[5]  Tracey Ho,et al.  Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[6]  Tracey Ho,et al.  A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.

[7]  Dan Boneh,et al.  Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures , 2011, Public Key Cryptography.

[8]  Dirk Westhoff,et al.  Data obfuscation with network coding , 2012, Comput. Commun..

[9]  Moustafa Youssef,et al.  A source authentication scheme using network coding , 2011, Int. J. Secur. Networks.

[10]  Muriel Médard,et al.  An algebraic approach to network coding , 2003, TNET.

[11]  Xuemin Shen,et al.  A scalable and robust key pre-distribution scheme with network coding for sensor data storage , 2011, Comput. Networks.

[12]  C. Siva Ram Murthy,et al.  On enhancing the random linear network coding , 2011, 2011 17th IEEE International Conference on Networks.

[13]  Tracey Ho,et al.  Resilient Network Coding in the Presence of Byzantine Adversaries , 2007, INFOCOM.

[14]  Helena Handschuh,et al.  Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.

[15]  J. Rodgers,et al.  Thirteen ways to look at the correlation coefficient , 1988 .

[16]  Tracey Ho,et al.  Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[17]  Xuemin Shen,et al.  P-Coding: Secure Network Coding against Eavesdropping Attacks , 2010, 2010 Proceedings IEEE INFOCOM.

[18]  Zhiwei Li,et al.  Node localization through physical layer network coding: Bootstrap, security, and accuracy , 2012, Ad Hoc Networks.

[19]  Baochun Li,et al.  How Practical is Network Coding? , 2006, 200614th IEEE International Workshop on Quality of Service.

[20]  Xuemin Shen,et al.  An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding , 2009, IEEE INFOCOM 2009.

[21]  Muriel Médard,et al.  Random Linear Network Coding: A free cipher? , 2007, 2007 IEEE International Symposium on Information Theory.

[22]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[23]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[24]  J. Heide,et al.  Network Coding for Mobile Devices - Systematic Binary Random Rateless Codes , 2009, 2009 IEEE International Conference on Communications Workshops.

[25]  Xuemin Shen,et al.  A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding , 2009, Comput. Networks.

[26]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[27]  Krishna R. Narayanan,et al.  Weakly Secure Network Coding , 2005 .

[28]  Carl B. Bates,et al.  BI-CHI: A COMPUTER PROGRAM FOR THE CHI-SQUARE GOODNESS OF FIT TEST FOR A BIVARIATE NORMAL DISTRIBUTION , 1967 .

[29]  D. E. Rutherford Inverses of Boolean matrices , 1963 .

[30]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .