TY - GEN
T1 - XOR network coding pollution prevention without homomorphic functions
AU - Corena, Juan Camilo
AU - Basu, Anirban
AU - Kiyomoto, Shinsaku
AU - Miyake, Yutaka
AU - Ohtsuki, Tomoaki
N1 - Funding Information:
This article is based on research conducted within the ‘Procedures for accounting and baselines for projects under Joint Implementation and the Clean Development Mechanism’ (PROBASE) project of the Fifth Framework Programme ‘Energy, Environment and Sustainable Development’ of the European Commission (EC). We wish to acknowledge the participants of the PROBASE project for their invaluable contributions to this study with their comments on an earlier draft of this article. We would like to express special thanks to Dr Katherine Begg, Dr Axel Michaelowa, Dr Catrinus Jepma, Dr Wolf Fichtner, Wytze van der Gaast and Johannes Rosen for their help. We are also grateful to the EC for their support.
PY - 2014
Y1 - 2014
N2 - Network coding is a way of transmitting information where nodes in a network combine incoming packets into a single one to increase throughput in some scenarios, nodes wishing to get the original information can perform decoding when enough packets have been received. Given its efficiency, the exclusive or (XOR) operation is very popular for network coding. One security concern for networks using network coding is the so called 'pollution attack', where an adversary introduces packets that are not combinations of the original ones. In this paper, we present a construction to prevent pollution attacks in XOR network coding that is suitable for networks where nodes must perform fast verifications. Unlike existing constructions in the literature which are based on XOR-homomorphic authentication functions, our construction can be instantiated with existing cryptographic primitives that are not related to the XOR operation. The core insight of our proposal is a carefully selected set of authenticated packets that are used to authenticate the network coding stream. We show that our proposal is computationally efficient at the intermediate nodes and that can be computed efficiently at the nodes which are generating the content.
AB - Network coding is a way of transmitting information where nodes in a network combine incoming packets into a single one to increase throughput in some scenarios, nodes wishing to get the original information can perform decoding when enough packets have been received. Given its efficiency, the exclusive or (XOR) operation is very popular for network coding. One security concern for networks using network coding is the so called 'pollution attack', where an adversary introduces packets that are not combinations of the original ones. In this paper, we present a construction to prevent pollution attacks in XOR network coding that is suitable for networks where nodes must perform fast verifications. Unlike existing constructions in the literature which are based on XOR-homomorphic authentication functions, our construction can be instantiated with existing cryptographic primitives that are not related to the XOR operation. The core insight of our proposal is a carefully selected set of authenticated packets that are used to authenticate the network coding stream. We show that our proposal is computationally efficient at the intermediate nodes and that can be computed efficiently at the nodes which are generating the content.
UR - http://www.scopus.com/inward/record.url?scp=84906834400&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84906834400&partnerID=8YFLogxK
U2 - 10.1109/CCNC.2014.6866586
DO - 10.1109/CCNC.2014.6866586
M3 - Conference contribution
AN - SCOPUS:84906834400
SN - 9781479923557
T3 - 2014 IEEE 11th Consumer Communications and Networking Conference, CCNC 2014
SP - 293
EP - 300
BT - 2014 IEEE 11th Consumer Communications and Networking Conference, CCNC 2014
PB - IEEE Computer Society
T2 - 2014 IEEE 11th Consumer Communications and Networking Conference, CCNC 2014
Y2 - 10 January 2014 through 13 January 2014
ER -