A multiple-MAC-based protocol to identify misbehaving nodes in network coding

Juan Camilo Corena, Tomoaki Ohtsuki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In network coding, intermediate nodes are allowed to transmit a function of the packets, instead of the traditional scheme where unmodified packets travel through the network. Some of the advantages of this mechanism are: a unified way to represent Broadcast, Multicast and Unicast, robustness in link and node failures and robustness to routing loops. However, allowing intermediate nodes to change information, introduces new points where byzantine attackers may try to disrupt the network. In this paper, we present a Message Authentication Code (MAC) Based protocol which can identify misbehaving nodes. Our construction uses only fast symmetric cryptographic operations, making it suitable for multicast networks, where latency is an important factor. For its construction, we used an efficient key assignment based on Blom's scheme, and a Merkle tree to provide authenticity during our identification routine. We show our construction is relevant in the context of network coding, by showing its execution time compared to that of pollution detection routines and other schemes used for authentication.

Original languageEnglish
Title of host publicationIEEE Vehicular Technology Conference
DOIs
Publication statusPublished - 2012
Event76th IEEE Vehicular Technology Conference, VTC Fall 2012 - Quebec City, QC, Canada
Duration: 2012 Sep 32012 Sep 6

Other

Other76th IEEE Vehicular Technology Conference, VTC Fall 2012
CountryCanada
CityQuebec City, QC
Period12/9/312/9/6

Fingerprint

Message Authentication Code
Network coding
Network Coding
Authentication
Pollution detection
Vertex of a graph
Multicast
Robustness
Pollution
Broadcast
Execution Time
Latency
Routing
Assignment

Keywords

  • Car-to-car
  • OFDM
  • Radar

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Science Applications
  • Applied Mathematics

Cite this

A multiple-MAC-based protocol to identify misbehaving nodes in network coding. / Corena, Juan Camilo; Ohtsuki, Tomoaki.

IEEE Vehicular Technology Conference. 2012. 6399271.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Corena, JC & Ohtsuki, T 2012, A multiple-MAC-based protocol to identify misbehaving nodes in network coding. in IEEE Vehicular Technology Conference., 6399271, 76th IEEE Vehicular Technology Conference, VTC Fall 2012, Quebec City, QC, Canada, 12/9/3. https://doi.org/10.1109/VTCFall.2012.6399271
Corena, Juan Camilo ; Ohtsuki, Tomoaki. / A multiple-MAC-based protocol to identify misbehaving nodes in network coding. IEEE Vehicular Technology Conference. 2012.
@inproceedings{9aa1a2b7eecf4649bc8bf5996e756a19,
title = "A multiple-MAC-based protocol to identify misbehaving nodes in network coding",
abstract = "In network coding, intermediate nodes are allowed to transmit a function of the packets, instead of the traditional scheme where unmodified packets travel through the network. Some of the advantages of this mechanism are: a unified way to represent Broadcast, Multicast and Unicast, robustness in link and node failures and robustness to routing loops. However, allowing intermediate nodes to change information, introduces new points where byzantine attackers may try to disrupt the network. In this paper, we present a Message Authentication Code (MAC) Based protocol which can identify misbehaving nodes. Our construction uses only fast symmetric cryptographic operations, making it suitable for multicast networks, where latency is an important factor. For its construction, we used an efficient key assignment based on Blom's scheme, and a Merkle tree to provide authenticity during our identification routine. We show our construction is relevant in the context of network coding, by showing its execution time compared to that of pollution detection routines and other schemes used for authentication.",
keywords = "Car-to-car, OFDM, Radar",
author = "Corena, {Juan Camilo} and Tomoaki Ohtsuki",
year = "2012",
doi = "10.1109/VTCFall.2012.6399271",
language = "English",
isbn = "9781467318815",
booktitle = "IEEE Vehicular Technology Conference",

}

TY - GEN

T1 - A multiple-MAC-based protocol to identify misbehaving nodes in network coding

AU - Corena, Juan Camilo

AU - Ohtsuki, Tomoaki

PY - 2012

Y1 - 2012

N2 - In network coding, intermediate nodes are allowed to transmit a function of the packets, instead of the traditional scheme where unmodified packets travel through the network. Some of the advantages of this mechanism are: a unified way to represent Broadcast, Multicast and Unicast, robustness in link and node failures and robustness to routing loops. However, allowing intermediate nodes to change information, introduces new points where byzantine attackers may try to disrupt the network. In this paper, we present a Message Authentication Code (MAC) Based protocol which can identify misbehaving nodes. Our construction uses only fast symmetric cryptographic operations, making it suitable for multicast networks, where latency is an important factor. For its construction, we used an efficient key assignment based on Blom's scheme, and a Merkle tree to provide authenticity during our identification routine. We show our construction is relevant in the context of network coding, by showing its execution time compared to that of pollution detection routines and other schemes used for authentication.

AB - In network coding, intermediate nodes are allowed to transmit a function of the packets, instead of the traditional scheme where unmodified packets travel through the network. Some of the advantages of this mechanism are: a unified way to represent Broadcast, Multicast and Unicast, robustness in link and node failures and robustness to routing loops. However, allowing intermediate nodes to change information, introduces new points where byzantine attackers may try to disrupt the network. In this paper, we present a Message Authentication Code (MAC) Based protocol which can identify misbehaving nodes. Our construction uses only fast symmetric cryptographic operations, making it suitable for multicast networks, where latency is an important factor. For its construction, we used an efficient key assignment based on Blom's scheme, and a Merkle tree to provide authenticity during our identification routine. We show our construction is relevant in the context of network coding, by showing its execution time compared to that of pollution detection routines and other schemes used for authentication.

KW - Car-to-car

KW - OFDM

KW - Radar

UR - http://www.scopus.com/inward/record.url?scp=84878955145&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84878955145&partnerID=8YFLogxK

U2 - 10.1109/VTCFall.2012.6399271

DO - 10.1109/VTCFall.2012.6399271

M3 - Conference contribution

SN - 9781467318815

BT - IEEE Vehicular Technology Conference

ER -