A multiple-MAC-based protocol to identify misbehaving nodes in network coding

Juan Camilo Corena, Tomoaki Ohtsuki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

In network coding, intermediate nodes are allowed to transmit a function of the packets, instead of the traditional scheme where unmodified packets travel through the network. Some of the advantages of this mechanism are: a unified way to represent Broadcast, Multicast and Unicast, robustness in link and node failures and robustness to routing loops. However, allowing intermediate nodes to change information, introduces new points where byzantine attackers may try to disrupt the network. In this paper, we present a Message Authentication Code (MAC) Based protocol which can identify misbehaving nodes. Our construction uses only fast symmetric cryptographic operations, making it suitable for multicast networks, where latency is an important factor. For its construction, we used an efficient key assignment based on Blom's scheme, and a Merkle tree to provide authenticity during our identification routine. We show our construction is relevant in the context of network coding, by showing its execution time compared to that of pollution detection routines and other schemes used for authentication.

Original languageEnglish
Title of host publication2012 IEEE Vehicular Technology Conference, VTC Fall 2012 - Proceedings
DOIs
Publication statusPublished - 2012 Dec 1
Event76th IEEE Vehicular Technology Conference, VTC Fall 2012 - Quebec City, QC, Canada
Duration: 2012 Sept 32012 Sept 6

Publication series

NameIEEE Vehicular Technology Conference
ISSN (Print)1550-2252

Other

Other76th IEEE Vehicular Technology Conference, VTC Fall 2012
Country/TerritoryCanada
CityQuebec City, QC
Period12/9/312/9/6

Keywords

  • Car-to-car
  • OFDM
  • Radar

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'A multiple-MAC-based protocol to identify misbehaving nodes in network coding'. Together they form a unique fingerprint.

Cite this