A Novel Homomorphic Against Intersession Coding attacks Using InterMac
نویسندگان
چکیده
Network coding allows intermediate nodes to encode data packets, which increases network throughput and enhances robustness. However, once the node injects corrupted data blocks into a network, the polluted data blocks will propagate quickly with network coding. In the existing approach a new homomorphic MAC scheme called SpaceMac, which makes it possible for an intermediate node validating whether received packets remain in a selected subspace, even when the subspace is expanding eventually. Then, by using SpaceMac to be the building block to develop a cooperative scheme that gives complete defense against pollution attacks: (i) it might detect polluted packets early at intermediate nodes, and (ii) it could know the exact location of every, even colluding, attackers, thereby making it a possibility to eliminate them. This system fails to detects the malicious attacks in inter-session attacks of souce packets. In this proposed work, we'll first define precisely damaged packets in inter-session pollution based on the commitment of a given source packets. Within this system a new detection scheme: one hash-based and other MAC-based schemes i.e(Improved InterMac and SpaceMac). InterMac is the first multisource homomorphic HMAC scheme that supports multiple keys. All schemes provide in-network detection, are collusion-resistant, and have very low online bandwidth and computation overhead.
منابع مشابه
Quantitative Evaluation of Secure Network Coding using Homomorphic Signature/Hashing
Network coding has gained significant attention by improving throughput and reliability in disruptive MANETs. Yet, it is vulnerable to attacks from malicious nodes. In order to prevent malicious attacks, we have explored the use of secure network coding schemes based on homomorphic properties of cryptographic systems. While homomorphic methods protect network coding from both external and inter...
متن کاملSignatures for Network Coding
In communication networks, files commonly are separated into data packets and transmitted from the source node to a prescribed set of destination nodes by a method known as “store and forward”, in which data packets received are stored and then forwarded to the next node. Network coding has been proposed to replace the traditional “store and forward” model, and to improve the throughput and rob...
متن کاملFast multicast scheme with secure network coding in cloud data centers
Multicast is widely applied in cloud data centers. Because intermediate nodes can encode the packets, network coding improves the capacity and robustness of multicast applications. However, this system is vulnerable to pollution attacks. Existing schemes mainly focus on homomorphic cryptographic technologies against such attacks. However, the homomorphic cryptographic technology introduces comp...
متن کاملReliable Transmission of Packet Using Homomorphic Hash Function
Privacy threat is one of the critical issues in wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network coding has the potential to thwart these attacks since the coding/mixing operation is encouraged at intermediate nodes. However, the simple deployment of network coding cannot achieve t...
متن کاملHomomorphic MACs: MAC-Based Integrity for Network Coding
Network coding has been shown to improve the capacity and robustness in networks. However, since intermediate nodes modify packets en-route, integrity of data cannot be checked using traditional MACs and checksums. In addition, network coded systems are vulnerable to pollution attacks where a single malicious node can flood the network with bad packets and prevent the receiver from decoding the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013