TY - GEN
T1 - Thwarting Diversity Attacks in wireless network coding using threshold signatures and a sender-centered approach
AU - Corena, Juan Camilo
AU - Ohtsuki, Tomoaki
PY - 2012/12/1
Y1 - 2012/12/1
N2 - In this work we present two t-collusion resistant schemes to detect nodes performing 'Diversity Attacks' in network coding. This attack was introduced by Popa et al. in [1] and occurs when nodes performing network coding, do not code from some of their neighbors or they do not use random coefficients, which reduces network performance; this attack is fundamentally different from Pollution Attacks and it cannot be detected by current pollution prevention schemes. Our construction differs from the original solution in that it makes use of the broadcast nature of wireless networks; which allows us to reduce the computational load of both receivers and senders compared to their non-probabilistic solution; as an additional advantage, one of our constructions works without knowledge of the topology beyond the neighbors of a node, improving one of the shortcomings of the original solution. Tools employed in our constructions involve threshold digital signatures and aggregate Message Authentication Codes (MACs).
AB - In this work we present two t-collusion resistant schemes to detect nodes performing 'Diversity Attacks' in network coding. This attack was introduced by Popa et al. in [1] and occurs when nodes performing network coding, do not code from some of their neighbors or they do not use random coefficients, which reduces network performance; this attack is fundamentally different from Pollution Attacks and it cannot be detected by current pollution prevention schemes. Our construction differs from the original solution in that it makes use of the broadcast nature of wireless networks; which allows us to reduce the computational load of both receivers and senders compared to their non-probabilistic solution; as an additional advantage, one of our constructions works without knowledge of the topology beyond the neighbors of a node, improving one of the shortcomings of the original solution. Tools employed in our constructions involve threshold digital signatures and aggregate Message Authentication Codes (MACs).
UR - http://www.scopus.com/inward/record.url?scp=84877650841&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84877650841&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2012.6503253
DO - 10.1109/GLOCOM.2012.6503253
M3 - Conference contribution
AN - SCOPUS:84877650841
SN - 9781467309219
T3 - GLOBECOM - IEEE Global Telecommunications Conference
SP - 1060
EP - 1065
BT - 2012 IEEE Global Communications Conference, GLOBECOM 2012
T2 - 2012 IEEE Global Communications Conference, GLOBECOM 2012
Y2 - 3 December 2012 through 7 December 2012
ER -