针对窃听攻击的高效弱安全网络编码方案

Yawen Wei, Zhen Yu, Y. Guan
{"title":"针对窃听攻击的高效弱安全网络编码方案","authors":"Yawen Wei, Zhen Yu, Y. Guan","doi":"10.1109/NETCOD.2010.5487671","DOIUrl":null,"url":null,"abstract":"Network coding is promising for improving network throughput in various networking systems. However, the systems adopting network coding are vulnerable to wiretapping attacks, in which adversaries wiretap on a subset of links and solve for information symbols that are intended to be decoded only by receivers. A number of solutions have been proposed to prevent information leakage to wiretappers, however, they either enlarge the finite field over which the coding is done and thus consume more communication bandwidth, or reduce the multicast rate due to inserting random numbers into the source. In this paper, we propose two efficient coding schemes against wiretapping attacks. Our schemes are weakly-secure, i.e., the wiretapper can obtain some linear combination of the information symbols, but he cannot solve for any single one. Both schemes utilize a permutation function to randomize the message vector sent by the source. The first scheme inserts only one random symbol into the source; the second scheme inserts no random symbols at all and thus achieves the maximum multicast capacity. Moreover, the second scheme retains the same finite field size as insecure coding schemes, thus does not consume more bandwidth to transmit symbols and encoding coefficients. Our schemes are lightweight: the permutation function can be implemented using Linear Feedback Shift Register (LFSR) or its variants, which can be efficiently implemented in hardware.","PeriodicalId":347232,"journal":{"name":"2010 IEEE International Symposium on Network Coding (NetCod)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"31","resultStr":"{\"title\":\"Efficient Weakly-Secure Network Coding Schemes against Wiretapping Attacks\",\"authors\":\"Yawen Wei, Zhen Yu, Y. Guan\",\"doi\":\"10.1109/NETCOD.2010.5487671\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network coding is promising for improving network throughput in various networking systems. However, the systems adopting network coding are vulnerable to wiretapping attacks, in which adversaries wiretap on a subset of links and solve for information symbols that are intended to be decoded only by receivers. A number of solutions have been proposed to prevent information leakage to wiretappers, however, they either enlarge the finite field over which the coding is done and thus consume more communication bandwidth, or reduce the multicast rate due to inserting random numbers into the source. In this paper, we propose two efficient coding schemes against wiretapping attacks. Our schemes are weakly-secure, i.e., the wiretapper can obtain some linear combination of the information symbols, but he cannot solve for any single one. Both schemes utilize a permutation function to randomize the message vector sent by the source. The first scheme inserts only one random symbol into the source; the second scheme inserts no random symbols at all and thus achieves the maximum multicast capacity. Moreover, the second scheme retains the same finite field size as insecure coding schemes, thus does not consume more bandwidth to transmit symbols and encoding coefficients. Our schemes are lightweight: the permutation function can be implemented using Linear Feedback Shift Register (LFSR) or its variants, which can be efficiently implemented in hardware.\",\"PeriodicalId\":347232,\"journal\":{\"name\":\"2010 IEEE International Symposium on Network Coding (NetCod)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-06-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"31\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE International Symposium on Network Coding (NetCod)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NETCOD.2010.5487671\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Symposium on Network Coding (NetCod)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NETCOD.2010.5487671","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 31

摘要

在各种网络系统中,网络编码有望提高网络吞吐量。然而,采用网络编码的系统容易受到窃听攻击,在这种攻击中,攻击者窃听链路的子集并解决仅由接收器解码的信息符号。为了防止信息泄露给窃听者,已经提出了许多解决方案,然而,它们要么扩大编码的有限域,从而消耗更多的通信带宽,要么由于在源中插入随机数而降低多播速率。在本文中,我们提出了两种有效的编码方案来对抗窃听攻击。我们的方案是弱安全的,即窃听者可以得到一些信息符号的线性组合,但他不能解出任何一个。这两种方案都利用置换函数来随机化源发送的消息向量。第一种方案只在源中插入一个随机符号;第二种方案完全不插入随机符号,从而获得最大的组播容量。此外,第二种方案保留了与不安全编码方案相同的有限域大小,因此不会消耗更多的带宽来传输符号和编码系数。我们的方案是轻量级的:排列函数可以使用线性反馈移位寄存器(LFSR)或其变体来实现,这可以在硬件中有效地实现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Efficient Weakly-Secure Network Coding Schemes against Wiretapping Attacks
Network coding is promising for improving network throughput in various networking systems. However, the systems adopting network coding are vulnerable to wiretapping attacks, in which adversaries wiretap on a subset of links and solve for information symbols that are intended to be decoded only by receivers. A number of solutions have been proposed to prevent information leakage to wiretappers, however, they either enlarge the finite field over which the coding is done and thus consume more communication bandwidth, or reduce the multicast rate due to inserting random numbers into the source. In this paper, we propose two efficient coding schemes against wiretapping attacks. Our schemes are weakly-secure, i.e., the wiretapper can obtain some linear combination of the information symbols, but he cannot solve for any single one. Both schemes utilize a permutation function to randomize the message vector sent by the source. The first scheme inserts only one random symbol into the source; the second scheme inserts no random symbols at all and thus achieves the maximum multicast capacity. Moreover, the second scheme retains the same finite field size as insecure coding schemes, thus does not consume more bandwidth to transmit symbols and encoding coefficients. Our schemes are lightweight: the permutation function can be implemented using Linear Feedback Shift Register (LFSR) or its variants, which can be efficiently implemented in hardware.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信