{"title":"一种针对熵攻击的基于边缘的网络编码认证方法","authors":"Ryo Iguchi, Yoshifumi Manabe","doi":"10.1109/ICDCSW.2014.9","DOIUrl":null,"url":null,"abstract":"This paper proposes a new edge-based authentication scheme for network coding. Many authentication schemes for random linear network coding have been proposed against pollution attacks. However, random linear network coding is vulnerable to entropy attacks. An adversary can generate messages that are verified as correct messages by the authentication mechanism but obstruct the network coding. Random linear network coding is shown to be efficient in a random failure model, but not in an adversary model. This paper shows a simple solution to tolerate entropy attacks by changing random linear coding to deterministic message combining rule. For an example, this paper shows a modification of RIPPLE, an authentication scheme for random linear network coding. Lastly, we show that the total delay of modified RIPPLE can be reduced by an edge-based authentication. RIPPLE and many other authentication schemes are node-based, that is, verification keys and operations are defined for each node. We show that we can construct an edge-based scheme, that is, verification keys and operations are defined for each edge. We show that the edge-based authentication scheme is more efficient than the node-based schemes.","PeriodicalId":195042,"journal":{"name":"2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"An Efficient Edge-Based Authentication for Network Coding against Entropy Attacks\",\"authors\":\"Ryo Iguchi, Yoshifumi Manabe\",\"doi\":\"10.1109/ICDCSW.2014.9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a new edge-based authentication scheme for network coding. Many authentication schemes for random linear network coding have been proposed against pollution attacks. However, random linear network coding is vulnerable to entropy attacks. An adversary can generate messages that are verified as correct messages by the authentication mechanism but obstruct the network coding. Random linear network coding is shown to be efficient in a random failure model, but not in an adversary model. This paper shows a simple solution to tolerate entropy attacks by changing random linear coding to deterministic message combining rule. For an example, this paper shows a modification of RIPPLE, an authentication scheme for random linear network coding. Lastly, we show that the total delay of modified RIPPLE can be reduced by an edge-based authentication. RIPPLE and many other authentication schemes are node-based, that is, verification keys and operations are defined for each node. We show that we can construct an edge-based scheme, that is, verification keys and operations are defined for each edge. We show that the edge-based authentication scheme is more efficient than the node-based schemes.\",\"PeriodicalId\":195042,\"journal\":{\"name\":\"2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDCSW.2014.9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDCSW.2014.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Efficient Edge-Based Authentication for Network Coding against Entropy Attacks
This paper proposes a new edge-based authentication scheme for network coding. Many authentication schemes for random linear network coding have been proposed against pollution attacks. However, random linear network coding is vulnerable to entropy attacks. An adversary can generate messages that are verified as correct messages by the authentication mechanism but obstruct the network coding. Random linear network coding is shown to be efficient in a random failure model, but not in an adversary model. This paper shows a simple solution to tolerate entropy attacks by changing random linear coding to deterministic message combining rule. For an example, this paper shows a modification of RIPPLE, an authentication scheme for random linear network coding. Lastly, we show that the total delay of modified RIPPLE can be reduced by an edge-based authentication. RIPPLE and many other authentication schemes are node-based, that is, verification keys and operations are defined for each node. We show that we can construct an edge-based scheme, that is, verification keys and operations are defined for each edge. We show that the edge-based authentication scheme is more efficient than the node-based schemes.