An Efficient Short Null Keys Based Scheme for Securing Network Coding Against Pollution Attacks
نویسندگان
چکیده
Network coding has gained wide attention nowadays for its significant advantages on many aspects compared with traditional routing mechanism. However, if there are malicious nodes launching pollution attacks by tampering or forging data packets in the communication network, the sink nodes will suffer from failure decoding, together with serious results such as bandwidth wasting, longer transmission delay and increasing computation overheads. The original null keys based pollution detection scheme cannot efficiently defend against pollution attacks when the system has colluding attackers because of high communication overheads. Therefore, we firstly define the concept of complete null space, with the property that no pollution packets can pass its verification. We then propose the idea of partial position detection and design an algorithm to construct short null keys. Secondly, we provide a short null keys based pollution detection scheme with network coding, which has lower overheads compared with the original null keys based pollution detection scheme in composing complete null space. Finally, rigorous theoretical proofs are given to analyze the security of the designed scheme.
منابع مشابه
SNKC: An Efficient On-the-fly Pollution Detection Scheme for Content Distribution with Linear Network Coding
Linear network coding (LNC) has attracted significant attention because it has the potential to achieve the throughput capacity of a network. However, transmission systems with LNC are vulnerable to pollution attacks in which normal packets will be corrupted by malicious relay nodes and participate in normal encoding process. The null keys based error detection schemes have been designed to eff...
متن کاملAn Efficient Hybrid Cryptographic Scheme for Wireless Sensor Network with Network Coding
Wireless sensor network (WSN) using network coding is vulnerable to pollution attacks. Existing authentication schemes addressing this attack either burden the sensor node with a higher computation overhead, or fail to provide an efficient way to mitigate two recently reported attacks: tag pollution attacks and repetitive attacks, which makes them inapplicable to WSN. This paper proposes an eff...
متن کاملA Novel Homomorphic Against Intersession Coding attacks Using InterMac
Network coding allows intermediate nodes to encode data packets, which increases network throughput and enhances robustness. However, once the node injects corrupted data blocks into a network, the polluted data blocks will propagate quickly with network coding. In the existing approach a new homomorphic MAC scheme called SpaceMac, which makes it possible for an intermediate node validating whe...
متن کاملAn Efficient Key Pre - distribution Scheme for Multiple Attacks
Probabilistic Key pre-distribution schemes (P-KPSs) are candidates for securing interactions between resource limited computer networks. Collusion susceptible P-KPSs are trade-offs between security and complexity and security include resistance to passive eavesdropping attacks, and active message injection attacks. The existing work presented the P-KPS, the subset keys and identity tickets (SKI...
متن کاملAn Efficient Dynamic Authentication Scheme for Secure Network Coding
Network coding based applications are notoriously susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. However, existing packets authentication schemes for network coding either incur high computation overhead, or are vulnerable to arbitrary collusion among attackers. In this paper, w...
متن کامل