Skip navigation

An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks

An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks

Esfahani, Alireza, Mantas, Georgios, Rodriguez, Jonathan and Neves, José Carlos (2016) An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks. International Journal of Information Security, 16 (6). pp. 627-639. ISSN 1615-5262 (Print), 1615-5270 (Online) (doi:https://doi.org/10.1007/s10207-016-0351-z)

Full text not available from this repository.

Abstract

Recent research efforts have shown that wireless networks can benefit from network coding (NC) technology in terms of bandwidth, robustness to packet losses, delay and energy consumption. However, NC-enabled wireless networks are susceptible to a severe security threat, known as data pollution attack, where a malicious node injects into the network polluted packets that prevent the destination nodes from decoding correctly. Due to recoding, occurred at the intermediate nodes, according to the core principle of NC, the polluted packets propagate quickly into other packets and corrupt bunches of legitimate packets leading to network resource waste. Hence, a lot of research effort has been devoted to schemes against data pollution attacks. Homomorphic MAC-based schemes are a promising solution against data pollution attacks. However, most of them are susceptible to a new type of pollution attack, called tag pollution attack, where an adversary node randomly modifies tags appended to the end of the transmitted packets. Therefore, in this paper, we propose an efficient homomorphic message authentication code-based scheme, called HMAC, providing resistance against data pollution attacks and tag pollution attacks in NC-enabled wireless networks. Our proposed scheme makes use of three types of homomorphic tags (i.e., MACs, D-MACs and one signature) which are appended to the end of the coded packet. Our results show that the proposed HMAC scheme is more efficient compared to other competitive tag pollution immune schemes in terms of complexity, communication overhead and key storage overhead.

Item Type: Article
Additional Information: Impact Factor: 1.915
Uncontrolled Keywords: Network coding, Security, Data pollution attack, Tag pollution attack, Wireless networks
Subjects: T Technology > TA Engineering (General). Civil engineering (General)
Faculty / Department / Research Group: Faculty of Engineering & Science
Faculty of Engineering & Science > Department of Applied Engineering & Management
Last Modified: 16 Aug 2019 14:30
Selected for GREAT 2016: None
Selected for GREAT 2017: None
Selected for GREAT 2018: GREAT d
Selected for GREAT 2019: GREAT 6
URI: http://gala.gre.ac.uk/id/eprint/20103

Actions (login required)

View Item View Item