TY - GEN
T1 - A multiple-MAC-based protocol to identify misbehaving nodes in network coding
AU - Corena, Juan Camilo
AU - Ohtsuki, Tomoaki
PY - 2012/12/1
Y1 - 2012/12/1
N2 - In network coding, intermediate nodes are allowed to transmit a function of the packets, instead of the traditional scheme where unmodified packets travel through the network. Some of the advantages of this mechanism are: a unified way to represent Broadcast, Multicast and Unicast, robustness in link and node failures and robustness to routing loops. However, allowing intermediate nodes to change information, introduces new points where byzantine attackers may try to disrupt the network. In this paper, we present a Message Authentication Code (MAC) Based protocol which can identify misbehaving nodes. Our construction uses only fast symmetric cryptographic operations, making it suitable for multicast networks, where latency is an important factor. For its construction, we used an efficient key assignment based on Blom's scheme, and a Merkle tree to provide authenticity during our identification routine. We show our construction is relevant in the context of network coding, by showing its execution time compared to that of pollution detection routines and other schemes used for authentication.
AB - In network coding, intermediate nodes are allowed to transmit a function of the packets, instead of the traditional scheme where unmodified packets travel through the network. Some of the advantages of this mechanism are: a unified way to represent Broadcast, Multicast and Unicast, robustness in link and node failures and robustness to routing loops. However, allowing intermediate nodes to change information, introduces new points where byzantine attackers may try to disrupt the network. In this paper, we present a Message Authentication Code (MAC) Based protocol which can identify misbehaving nodes. Our construction uses only fast symmetric cryptographic operations, making it suitable for multicast networks, where latency is an important factor. For its construction, we used an efficient key assignment based on Blom's scheme, and a Merkle tree to provide authenticity during our identification routine. We show our construction is relevant in the context of network coding, by showing its execution time compared to that of pollution detection routines and other schemes used for authentication.
KW - Car-to-car
KW - OFDM
KW - Radar
UR - http://www.scopus.com/inward/record.url?scp=84878955145&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84878955145&partnerID=8YFLogxK
U2 - 10.1109/VTCFall.2012.6399271
DO - 10.1109/VTCFall.2012.6399271
M3 - Conference contribution
AN - SCOPUS:84878955145
SN - 9781467318815
T3 - IEEE Vehicular Technology Conference
BT - 2012 IEEE Vehicular Technology Conference, VTC Fall 2012 - Proceedings
T2 - 76th IEEE Vehicular Technology Conference, VTC Fall 2012
Y2 - 3 September 2012 through 6 September 2012
ER -