Ryma Boussaha, Y. Challal, Malika Bessedik, A. Bouabdallah
{"title":"面向命名数据网络的认证网络编码","authors":"Ryma Boussaha, Y. Challal, Malika Bessedik, A. Bouabdallah","doi":"10.23919/SOFTCOM.2017.8115565","DOIUrl":null,"url":null,"abstract":"Named Data Networking represents a novel and an alternative approach to the current host based Internet architecture, in which the content becomes the core of the communication model. In this paper, we propose to improve named data networking robustness and throughput performances by introducing network coding functionalities. We also propose an optimized authentication model based on homomorphic encryption to deal with the \"pollution attacks\" problem in which malicious nodes can flood the network with bad packets and prevent the reconstruction of information at recipients. We first present our optimized homomorphic signature scheme with respect to the practical constraints such as the processing overhead generated by complex cryptographic operations and we define the network coding scheme tailored for named data networking. Our numerical results demonstrate that the use of this optimized model reduces by 10% the overall calculation cost induced by cryptographic operations compared to a hop-by-hop coding and verification model.","PeriodicalId":189860,"journal":{"name":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Towards authenticated network coding for named data networking\",\"authors\":\"Ryma Boussaha, Y. Challal, Malika Bessedik, A. Bouabdallah\",\"doi\":\"10.23919/SOFTCOM.2017.8115565\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Named Data Networking represents a novel and an alternative approach to the current host based Internet architecture, in which the content becomes the core of the communication model. In this paper, we propose to improve named data networking robustness and throughput performances by introducing network coding functionalities. We also propose an optimized authentication model based on homomorphic encryption to deal with the \\\"pollution attacks\\\" problem in which malicious nodes can flood the network with bad packets and prevent the reconstruction of information at recipients. We first present our optimized homomorphic signature scheme with respect to the practical constraints such as the processing overhead generated by complex cryptographic operations and we define the network coding scheme tailored for named data networking. Our numerical results demonstrate that the use of this optimized model reduces by 10% the overall calculation cost induced by cryptographic operations compared to a hop-by-hop coding and verification model.\",\"PeriodicalId\":189860,\"journal\":{\"name\":\"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)\",\"volume\":\"75 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/SOFTCOM.2017.8115565\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/SOFTCOM.2017.8115565","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards authenticated network coding for named data networking
Named Data Networking represents a novel and an alternative approach to the current host based Internet architecture, in which the content becomes the core of the communication model. In this paper, we propose to improve named data networking robustness and throughput performances by introducing network coding functionalities. We also propose an optimized authentication model based on homomorphic encryption to deal with the "pollution attacks" problem in which malicious nodes can flood the network with bad packets and prevent the reconstruction of information at recipients. We first present our optimized homomorphic signature scheme with respect to the practical constraints such as the processing overhead generated by complex cryptographic operations and we define the network coding scheme tailored for named data networking. Our numerical results demonstrate that the use of this optimized model reduces by 10% the overall calculation cost induced by cryptographic operations compared to a hop-by-hop coding and verification model.