Online citations, reference lists, and bibliographies.
← Back to Search

A Source Authentication Scheme Using Network Coding

Ahmed Osama Fathy Atya, Tamer A. ElBatt, M. Youssef
Published 2011 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
In this paper, we explore the security merits of network coding and potential trade-offs with the widely accepted throughput benefits, especially in multicast scenarios. In particular, we propose a novel Source Authentication using Network Coding (SANC) scheme. Towards this objective, we propose a general framework for embedding the authentication information within the network coding Global Encoding Vector. First, we illustrate the proposed concept using a simple mapping function. Second, we present a detailed security analysis that reveals the security merits of the proposed scheme, contrasted against two baseline schemes. Finally, we present simulation results pertaining to the network coding performance.
This paper references
10.1109/ISIT.2007.4557282
Random Linear Network Coding: A free cipher?
L. Lima (2007)
10.1109/INFOCOM.2008.284
Reliability Gain of Network Coding in Lossy Wireless Networks
M. Ghaderi (2008)
10.1109/INFOCOM.2006.233
Cooperative Security for Network Coding File Distribution
Christos Gkantsidis (2006)
10.1109/TNET.2011.2126592
An Authentication Code Against Pollution Attacks in Network Coding
F. Oggier (2011)
10.1007/3-540-39568-7_2
A public key cryptosystem and a signature scheme based on discrete logarithms
T. Elgamal (1984)
10.1109/JCN.2009.6388411
Flexible, extensible, and efficient VANET authentication
Ahren Studer (2009)
10.1145/1111322.1111337
Network coding: an instant primer
C. Fragouli (2006)
10.1109/ISIT.2001.935967
An algebraic approach to network coding
R. Koetter (2001)
Challenges in Securing Vehicular Networks
Bryan Parno (2005)
10.1109/CISS.2006.286587
Signatures for Network Coding
D. Charles (2006)
10.1142/9789814304979_0004
Fields and Galois Theory
J. Howie (2006)
10.1109/INFOCOM.2008.199
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks
Zhen Yu (2008)
10.1109/ICTEL.2009.5158614
Performance of network coding for ad hoc networks in realistic simulation scenarios
Claudia Campolo (2009)
10.1007/978-3-642-01957-9_18
Homomorphic MACs: MAC-Based Integrity for Network Coding
Shweta Agrawal (2009)
10.1109/INFCOM.2009.5062146
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
Yanfei Fan (2009)
Message authentication using hash functions: The HMAC construction
M. Bellare (1996)
10.1109/TIT.2002.807285
Linear network coding
S. Li (2003)
10.1109/INFCOM.2005.1498493
On achieving optimal throughput with network coding
Z. Li (2005)
10.1109/INFCOM.2010.5462050
P-Coding: Secure Network Coding against Eavesdropping Attacks
Peng Zhang (2010)
10.1109/18.850663
Network information flow
R. Ahlswede (2000)
10.1109/ICC.2008.336
Lightweight Security for Network Coding
J. Vilela (2008)
10.1109/MILCOM.2006.302320
Performance of Network Coding in Ad Hoc Networks
J. Park (2006)
Dense Probabilistic Encryption
Josh Benaloh (1999)
10.1109/TIT.1985.1057074
A public key cryptosystem and a signature scheme based on discrete logarithms
T. Elgamal (1985)
10.1145/1399562.1399563
XORs in the air: practical wireless network coding
S. Katti (2008)
10.1007/3-540-48910-X_16
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Pascal Paillier (1999)
10.1109/INFCOMW.2011.5928775
SANC: Source authentication using network coding
Ahmed Fathy (2011)
10.1109/GLOCOM.2009.5425260
Tiered Authentication of Multicast Traffic in Wireless Ad-Hoc Networks
Mohamed F. Younis (2009)
10.1016/j.comnet.2009.08.006
An efficient dynamic-identity based signature scheme for secure network coding
Y. Jiang (2010)



This paper is referenced by
10.5220/0003382106040609
Security and Privacy in Cloud Computing
Ramakrishnan Krishnan (2017)
10.1109/SURV.2012.062612.00056
Game Theory for Network Security
Xiannuan Liang (2013)
10.14445/22315381/IJETT-V19P239
A Survey on Password Stealing Attacks and Its Protecting Mechanism
Siva Venkadesh (2015)
REVIEW OF PASSWORD PROTECTING MECHANISM
P. Venkateswari (2013)
Virtual Password with Secret Function and Codebook(VFC) scheme for Protecting User’s Password as a Test for Security
S. Suganthi (2014)
10.1504/IJSNET.2013.053722
EasiSec: a SoC security coprocessor based on fingerprint-based key management for WSN
Yi Wang (2013)
10.1504/IJSN.2013.055046
A review of GENI authentication and access control mechanisms
Z. Xiao (2013)
A Result Analysis on Secured Encryption in Cloud Computing using Symmetric Cryptography
Anand Darne (2014)
10.1109/SURV.2011.122111.00145
Cyber Security and Privacy Issues in Smart Grids
Jing Liu (2012)
10.1109/ICDCSW.2012.23
Authentication and Access Control in the Internet of Things
Jing Liu (2012)
10.1016/j.comnet.2014.09.013
ERSS-RLNC: Efficient and robust secure scheme for random linear network coding
Hassan N. Noura (2014)
10.1002/sec.574
A survey of accountability in computer networks and distributed systems
Z. Xiao (2016)
10.1007/978-94-007-5076-0_20
An Accountable Neighborhood Area Network in Smart Grids
J. Liu (2012)
10.1109/JSYST.2012.2183755
Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password Theft
Y. Xiao (2014)
10.2991/ICECEE-15.2015.209
Secure Network Coding-Based Named Data Network Mutual Anonymity communication Protocol
Tao Feng (2015)
10.1109/IWCMC.2013.6583563
On the flow anonymity problem in Network Coding
Ahmed Osama Fathy Atya (2013)
10.5220/0005002701710177
An efficient lightweight security algorithm for random linear network coding
Hassan N. Noura (2014)
10.1002/sec.407
Virtual flow-net for accountability and forensics of computer and network systems
D. Takahashi (2014)
10.1109/SURV.2012.060912.00182
Security and Privacy in Cloud Computing
Zhifeng Xiao (2013)
10.1504/IJSN.2012.053461
Internet of things' authentication and access control
Jing Liu (2012)
10.1109/ICCCN.2013.6614088
A New Efficient Secure Coding Scheme for Random Linear Network Coding
Hassan N. Noura (2013)
10.1016/J.COMNET.2019.106886
Design and realization of efficient & secure multi-homed systems based on random linear network coding
Hassan N. Noura (2019)
Semantic Scholar Logo Some data provided by SemanticScholar