Signatures for Network Coding

نویسنده

  • Ning Zhang
چکیده

In communication networks, files commonly are separated into data packets and transmitted from the source node to a prescribed set of destination nodes by a method known as “store and forward”, in which data packets received are stored and then forwarded to the next node. Network coding has been proposed to replace the traditional “store and forward” model, and to improve the throughput and robustness of networks. With linear network coding, instead of copying and forwarding, intermediate nodes compute linear combinations of previously received information, and create and transmit a new packet to the next nodes. However, some malicious intermediate nodes may modify the data of packets and the recipients not can distinguish the corrupted packets from uncorrupted ones. This is known as a “pollution attack”. Homomorphic hashings and homomorphic signatures were proposed to provide cryptographic protection against pollution attacks. First, we present Krohn et al.’s homomorphic hashing schemes for rateless erasure codes. This paper presented six homomorphic signature schemes for network coding including three pairing-based homomorphic signature schemes, three RSA-based homomorphic signature schemes, and a signature scheme using a vector orthogonal to the message linear subspace. We then discuss and compare the memory and communication overhead of five of these homomorphic signature schemes. Finally, we point out flaws with some of these schemes, even though some security analysis has been presented, and we present solutions to prevent such attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

تولید خودکار الگوهای نفوذ جدید با استفاده از طبقه‌بندهای تک کلاسی و روش‌های یادگیری استقرایی

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

متن کامل

Exploring Gene Signatures in Different Molecular Subtypes of Gastric Cancer (MSS/ TP53+, MSS/TP53-): A Network-based and Machine Learning Approach

Gastric cancer (GC) is one of the leading causes of cancer mortality, worldwide. Molecular understanding of GC’s different subtypes is still dismal and it is necessary to develop new subtype-specific diagnostic and therapeutic approaches. Therefore developing comprehensive research in this area is demanding to have a deeper insight into molecular processes, underlying these subtypes. In this st...

متن کامل

Homomorphic Network Coding Signatures in the Standard Model

Network coding is known to provide improved resilience to packet loss and increased throughput. Unlike traditional routing techniques, it allows network nodes to perform transformations on packets they receive before transmitting them. For this reason, packets cannot be authenticated using ordinary digital signatures, which makes it difficult to hedge against pollution attacks, where malicious ...

متن کامل

Efficient Network Coding Signatures in the Standard Model

Network Coding is a routing technique where each node may actively modify the received packets before transmitting them. While this departure from passive networks improves throughput and resilience to packet loss it renders transmission susceptible to pollution attacks where nodes can misbehave and change in a malicious way the messages transmitted. Nodes cannot use standard signature schemes ...

متن کامل

ظرفیت شبکه های حذفی تحت کدینگ فضایی شبکه

     We study the capacity of point-to-point erasure networks under a restricted form of network coding to which we refer as spatial network coding. In this form of coding, the nodes can not perform coding on successive packets which are received from one incoming link. The coding at a node is restricted to the packets received at the same time slot from different incoming links...

متن کامل

Influence of topology on neural networks based on the recognition of neural signatures

We study the emerging collective dynamics of a neural network model that emits and recognizes neural signatures with different network topologies in order to assess the capacity of a neural network to implement a signaturebased information processing strategy. Complex collective dynamics emerge in the proposed model in the presence of stimuli, i.e. specific incoming signatures. Results presente...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010