Title :
Performance Evaluation of Secure Network Coding Using Homomorphic Signature
Author :
Lee, Seung-Hoon ; Gerla, Mario ; Krawczyk, Hugo ; Lee, Kang-Won ; Quaglia, Elizabeth A.
Author_Institution :
Dept. of Comput. Sci., Univ. of California, Los Angeles, CA, USA
Abstract :
Network coding has gained significant attention by improving throughput and reliability in disruptive MANETs. Yet, it is vulnerable to attacks from malicious nodes. In order to prevent malicious attacks, we have explored the use of secure network coding schemes based on homomorphic properties of cryptographic systems. While homomorphic methods, especially those based on public key cryptography, provide strong protection against both external and internal attacks, they do increase processing overhead as they require complex cryptographic operations (e.g., exponentiation, multiplication, modular operations). The goal of this paper is two fold: assess the feasibility of implementing Homomorphic Network Coding in an off-the-shelf laptop/smartphone platform, and evaluate the processing and delay performance when such implementations are deployed in a simple network scenario. To this end, we have implemented in LINUX an RSA-based homomorphic algorithm which exhibits very competitive processing efficiency as compared with published (public-key) schemes. For the LINUX implementation we have measured the processing delay for various flow and parameter settings. We have then integrated the homomorphic processing model (with associated O/H) in a MANET network simulator. Using this simulator, we have evaluated the performance of secure network coding under various network conditions and have compared it with other secure network coding schemes. We conclude the paper with a discussion of secure coding feasibility and cost for different application scenarios.
Keywords :
Linux; laptop computers; mobile ad hoc networks; network coding; public key cryptography; telecommunication network reliability; LINUX; MANET network simulator; RSA-based homomorphic algorithm; disruptive MANET; external attacks; homomorphic signature; internal attacks; laptop/smartphone platform; malicious attacks; malicious nodes; public key cryptography; reliability; secure network coding; Delay; Encoding; Linux; Network coding; Portable computers; Public key;
Conference_Titel :
Network Coding (NetCod), 2011 International Symposium on
Conference_Location :
Beijing
Print_ISBN :
978-1-61284-138-0
DOI :
10.1109/ISNETCOD.2011.5978945