Title :
An Authentication Code Against Pollution Attacks in Network Coding
Author :
Oggier, Frédérique ; Fathi, Hanane
Author_Institution :
Sch. of Phys. & Math. Sci., Nanyang Technol. Univ., Singapore, Singapore
Abstract :
Systems exploiting network coding to increase their throughput suffer greatly from pollution attacks, which consist of injecting malicious packets in the network. The pollution attacks are amplified by the network coding process, resulting in a greater damage than under traditional routing. In this paper, we address this issue by designing an unconditionally secure authentication code (that is, which does not rely on computational assumptions) suitable for multicast network coding, where the keying material is initially computed and distributed by a trusted authority to the destinations and intermediate nodes. The proposed scheme allows not only destinations, but also intermediate nodes, to verify the integrity and origin of the packets received without having to decode, and thus detect and discard the malicious messages in transit that fail the verification. This way, the pollution is canceled out before reaching the destinations. The proposed scheme is robust against pollution attacks from outsiders, as well as coalitions of malicious insider nodes, which have the ability to perform the integrity check, but instead get corrupted and use their knowledge to themselves attack the network. We analyze the performance of the scheme in terms of both throughput and goodput and show that the price to pay for tolerating inside attackers is a high decrease in throughput (it is inversely proportional to the number of insider attackers that can collude). We finally discuss applications to file distribution.
Keywords :
message authentication; multicast communication; network coding; telecommunication security; destinations; file distribution; intermediate nodes; malicious insider nodes; malicious packets; multicast network coding; packet integrity; packet origin; pollution attacks; throughput; trusted authority; unconditionally secure authentication code; Authentication; Encoding; Network coding; Pollution; Polynomials; Vectors; Authentication codes; network coding; pollution attacks;
Journal_Title :
Networking, IEEE/ACM Transactions on
DOI :
10.1109/TNET.2011.2126592