DocumentCode :
1905735
Title :
An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks
Author :
Yu, Zhen ; Wei, Yawen ; Ramkumar, Bhuvaneswari ; Guan, Yong
Author_Institution :
Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA
fYear :
2009
fDate :
19-25 April 2009
Firstpage :
406
Lastpage :
414
Abstract :
Network coding is promising to maximize throughput in various networking systems. Compared to normal network coding operated over large finite fields, XOR network coding has gained an increasing number of applications for its simplicity, especially in wireless networks. However, both types of network coding systems are vulnerable to pollution attacks in which the compromised forwarders inject polluted messages into the systems. Existing solutions to pollution attacks can protect only the normal network coding, but none of them is able to secure XOR network coding. In this paper, we propose an efficient scheme for securing XOR network coding against pollution attacks. Our scheme exploits probabilistic key pre-distribution and message authentication codes (MACs). In our scheme, the source appends multiple MACs to each message, where each MAC can authenticate only a part of the message and the parts authenticated by different MACs are overlapped. Thus, multiple forwarders can collaboratively verify different parts of messages using the MACs with their own shared keys. By carefully controlling the overlapping between the parts authenticated by different MACs, our scheme can filter polluted messages in a few hops with a high probability. To the best of our knowledge, this is the first solution to pollution attacks for XOR network coding. Experimental results show that it is 200 to 1000 times faster than existing ones, hence, it is particularly suitable for resource-constrained wireless networks.
Keywords :
cryptography; encoding; message authentication; probability; radio networks; telecommunication security; message authentication code; pollution attack; probabilistic key pre-distribution; resource-constrained wireless network; secure XOR network coding; Collaboration; Filtering; Filters; Galois fields; Message authentication; Network coding; Pollution; Throughput; Wireless networks; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM 2009, IEEE
Conference_Location :
Rio de Janeiro
ISSN :
0743-166X
Print_ISBN :
978-1-4244-3512-8
Electronic_ISBN :
0743-166X
Type :
conf
DOI :
10.1109/INFCOM.2009.5061945
Filename :
5061945
Link To Document :
بازگشت