Thwarting Diversity Attacks in wireless network coding using threshold signatures and a sender-centered approach

Juan Camilo Corena, Tomoaki Ohtsuki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this work we present two t-collusion resistant schemes to detect nodes performing 'Diversity Attacks' in network coding. This attack was introduced by Popa et al. in [1] and occurs when nodes performing network coding, do not code from some of their neighbors or they do not use random coefficients, which reduces network performance; this attack is fundamentally different from Pollution Attacks and it cannot be detected by current pollution prevention schemes. Our construction differs from the original solution in that it makes use of the broadcast nature of wireless networks; which allows us to reduce the computational load of both receivers and senders compared to their non-probabilistic solution; as an additional advantage, one of our constructions works without knowledge of the topology beyond the neighbors of a node, improving one of the shortcomings of the original solution. Tools employed in our constructions involve threshold digital signatures and aggregate Message Authentication Codes (MACs).

Original languageEnglish
Title of host publication2012 IEEE Global Communications Conference, GLOBECOM 2012
Pages1060-1065
Number of pages6
DOIs
Publication statusPublished - 2012 Dec 1
Event2012 IEEE Global Communications Conference, GLOBECOM 2012 - Anaheim, CA, United States
Duration: 2012 Dec 32012 Dec 7

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Other

Other2012 IEEE Global Communications Conference, GLOBECOM 2012
Country/TerritoryUnited States
CityAnaheim, CA
Period12/12/312/12/7

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Thwarting Diversity Attacks in wireless network coding using threshold signatures and a sender-centered approach'. Together they form a unique fingerprint.

Cite this