Authentication for two-way relay channel with Physical-Layer Network coding

Physical Layer Network coding (PLNC) can significantly improve network performance, but some security issues arise due to the limited information available to the forwarders. This paper analyses authentication in networks with PLNC and show theoretical and practical security limits. In particular, we obtain a lower bound for the probability of an attacker being able to insert a false message such that the message is believed to come from a legitimate source. We prove that an information-theoretic bound similar to the one for point-to-point communication systems can be achieved in networks employing PLNC. Necessary and sufficient conditions to achieve the bound are identified. Finally, a simple but important modification of a previous scheme is proposed to achieve the obtained bound.

[1]  Soung Chang Liew,et al.  Hot topic: physical-layer network coding , 2006, MobiCom '06.

[2]  Wei-Ho Chung,et al.  Diffie-Hellman key distribution in wireless multi-way relay networks , 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference.

[3]  Ueli Maurer,et al.  Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.

[4]  H. Vincent Poor,et al.  Message Authentication: Information Theoretic Bounds , 2009 .

[5]  Reza Curtmola,et al.  Practical defenses against pollution attacks in wireless network coding , 2011, TSEC.

[6]  Gustavus J. Simmons,et al.  Authentication Theory/Coding Theory , 1985, CRYPTO.

[7]  Ute Rosenbaum A lower bound on authentication after having observed a sequence of messages , 2004, Journal of Cryptology.

[8]  Cédric Lauradoux,et al.  Energy Friendly Integrity for Network Coding in Wireless Sensor Networks , 2010, 2010 Fourth International Conference on Network and System Security.

[9]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[10]  Muriel Médard,et al.  XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.

[11]  Dingyi Pei Information-theoretic bounds for authentication codes and block designs , 2004, Journal of Cryptology.

[12]  Benxiong Huang,et al.  Survey of network coding-aware routing protocols in wireless networks , 2011, J. Netw. Comput. Appl..

[13]  Reza Curtmola,et al.  Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems , 2012, IEEE Transactions on Dependable and Secure Computing.