Loading [a11y]/accessibility-menu.js
An efficient MAC-signature scheme for authentication in XOR network coding | IEEE Conference Publication | IEEE Xplore
Scheduled Maintenance: On Monday, 27 January, the IEEE Xplore Author Profile management portal will undergo scheduled maintenance from 9:00-11:00 AM ET (1400-1600 UTC). During this time, access to the portal will be unavailable. We apologize for any inconvenience.

An efficient MAC-signature scheme for authentication in XOR network coding


Abstract:

An inherent weakness of network coding is that it is vulnerable to pollute attacks from adversaries, which may jeopardize its advantages such as throughput enhancement. M...Show More

Abstract:

An inherent weakness of network coding is that it is vulnerable to pollute attacks from adversaries, which may jeopardize its advantages such as throughput enhancement. Message Authentication Code (MAC) is commonly used scheme to provide integrity against data pollution by appending data and shared-key dependent tags. However, this scheme results in a new type of pollution called tag pollution, where a packet with polluted tags may traffic multiple hops before detection and result in network bandwidth waste. We propose a hybrid technical scheme, called MSXOR, which can detect tag pollution with low communication and computation overhead. We address the pollution attacks by designing an efficient MAC scheme suitable for multicast XOR network coding, and tag pollution attacks by appending a signature of all the MACs. Our experimental results show that it slightly increases the computation complexity, for the sake of resisting to tag pollution.
Date of Conference: 23-26 June 2014
Date Added to IEEE Xplore: 29 September 2014
Electronic ISBN:978-1-4799-4277-0
Print ISSN: 1530-1346
Conference Location: Funchal, Portugal

References

References is not available for this document.