A multiple-MAC-based protocol to identify misbehaving nodes in network coding

Juan Camilo Corena, Tomoaki Ohtsuki

研究成果: Conference contribution

3 被引用数 (Scopus)

抄録

In network coding, intermediate nodes are allowed to transmit a function of the packets, instead of the traditional scheme where unmodified packets travel through the network. Some of the advantages of this mechanism are: a unified way to represent Broadcast, Multicast and Unicast, robustness in link and node failures and robustness to routing loops. However, allowing intermediate nodes to change information, introduces new points where byzantine attackers may try to disrupt the network. In this paper, we present a Message Authentication Code (MAC) Based protocol which can identify misbehaving nodes. Our construction uses only fast symmetric cryptographic operations, making it suitable for multicast networks, where latency is an important factor. For its construction, we used an efficient key assignment based on Blom's scheme, and a Merkle tree to provide authenticity during our identification routine. We show our construction is relevant in the context of network coding, by showing its execution time compared to that of pollution detection routines and other schemes used for authentication.

本文言語English
ホスト出版物のタイトル2012 IEEE Vehicular Technology Conference, VTC Fall 2012 - Proceedings
DOI
出版ステータスPublished - 2012
イベント76th IEEE Vehicular Technology Conference, VTC Fall 2012 - Quebec City, QC, Canada
継続期間: 2012 9月 32012 9月 6

出版物シリーズ

名前IEEE Vehicular Technology Conference
ISSN(印刷版)1550-2252

Other

Other76th IEEE Vehicular Technology Conference, VTC Fall 2012
国/地域Canada
CityQuebec City, QC
Period12/9/312/9/6

ASJC Scopus subject areas

  • コンピュータ サイエンスの応用
  • 電子工学および電気工学
  • 応用数学

フィンガープリント

「A multiple-MAC-based protocol to identify misbehaving nodes in network coding」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル