Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Cart
Book cover

IFIP International Conference on Communications and Multimedia Security

CMS 2012: Communications and Multimedia Security pp 145–159Cite as

  1. Home
  2. Communications and Multimedia Security
  3. Conference paper
Efficiency of Secure Network Coding Schemes

Efficiency of Secure Network Coding Schemes

  • Elke Franz18,
  • Stefan Pfennig18 &
  • André Fischer18 
  • Conference paper
  • 1057 Accesses

  • 6 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7394)

Abstract

Network coding is a promising approach for increasing performance of multicast data transmission and reducing energy costs. Of course, it is essential to consider security aspects to ensure a reliable data transmission. Particularly, pollution attacks may have serious impacts in network coding since a single attacker can jam large parts of the network. Therefore, various approaches have been introduced to secure network coding against this type of attack.

However, introducing security increases costs. Even though there are some performance analysis of secure schemes, to our knowledge there are no details whether these schemes are worthwhile to replace routing under the facet of efficiency. Thus, we discuss in this paper parameters to assess the efficiency of secure network coding schemes. Using three network graphs, we evaluate parameters focusing on communication overhead for selected schemes. Our results show that there are still benefits in comparison to routing depending on the network topology.

Keywords

  • network coding
  • security
  • efficiency
  • performance

Download conference paper PDF

References

  1. Ahlswede, R., Cai, N., Li, S.-Y.R., Yeung, R.W.: Network information flow. IEEE Trans. on Information Theory 46(4), 1204–1216 (2000)

    CrossRef  MathSciNet  MATH  Google Scholar 

  2. Cai, N., Yeung, R.W.: Secure Network Coding. In: Proc. IEEE Int. Symp. on Information Theory (2002)

    Google Scholar 

  3. Chou, P.A., Wu, Y., Jain, K.: Practical network coding. In: Proc. Annual Allerton Conference on Communication, Control and Computing (2003)

    Google Scholar 

  4. Dong, J., Curtmola, R., Nita-Rotaru, C.: Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. In: Proc. WiSec (2009)

    Google Scholar 

  5. Dong, J., Curtmola, R., Nita-Rotaru, C.: Secure network coding for wireless mesh networks: Threats, challenges, and directions. Computer Communications 32, 1790–1801 (2009)

    CrossRef  Google Scholar 

  6. Fragouli, C., Le Boudec, J.-Y., Widmer, J.: Network coding: An instant primer. SIGCOMM Computer Communication Review 36, 63–68 (2006)

    CrossRef  Google Scholar 

  7. Fragouli, C., Soljanin, E.: Network Coding Applications. Now publishers (2007)

    Google Scholar 

  8. Fragouli, C., Soljanin, E.: Network Coding Fundamentals. Now publishers (2007)

    Google Scholar 

  9. Franz, E., Pfennig, S., Fischer, A.: Communication overhead of network coding schemes secure against pollution attacks. Technical Report TUD-FI12-07, TU Dresden (May 2012)

    Google Scholar 

  10. Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure Network Coding over the Integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142–160. Springer, Heidelberg (2010)

    CrossRef  Google Scholar 

  11. Gkantsidis, C., Rodriguez, P.R.: Cooperative Security for Network Coding File Distribution. In: Proc. IEEE Int. Conf. on Computer Communications (2006)

    Google Scholar 

  12. Ho, T., Koetter, R., Médard, M., Karger, D.R., Effros, M.: The benefits of coding over routing in a randomized setting. In: Proc. of the IEEE International Symposium on Information Theory (2003)

    Google Scholar 

  13. Ho, T., Leong, B., Koetter, R., Médard, M., Effros, M., Karger, D.R.: Byzantine Modification Detection in Multicast Networks with Random Network Coding. IEEE Trans. on Information Theory 54(6), 2798–2803 (2008)

    CrossRef  Google Scholar 

  14. Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Médard, M.: Resilient network coding in the presence of byzantine adversaries. In: Proc. 26th Annual IEEE Conf. on Computer Commun., INFOCOM, pp. 616–624 (2007)

    Google Scholar 

  15. Lima, L., Vilela, J.P., Oliveira, P.F., Barros, J.: Network coding security: Attacks and countermeasures. CoRR, abs/0809.1366 (2008)

    Google Scholar 

  16. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol. RSA CryptoBytes 5(2), 2–13 (2002)

    Google Scholar 

  17. Vilela, J.P., Lima, L., Barros, J.: Lightweight security for network coding. In: Proc. IEEE Int. Conf. on Communications (2008)

    Google Scholar 

  18. Wang, Y.: Insecure ”provably secure network coding” and homomorphic authentication schemes for network coding. IACR Eprint archive (2010)

    Google Scholar 

  19. Yeung, R.W.: Information Theory and Network Coding. Springer Publishing Company, Incorporated (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Faculty of Computer Science, TU Dresden, 01062, Dresden, Germany

    Elke Franz, Stefan Pfennig & André Fischer

Authors
  1. Elke Franz
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Stefan Pfennig
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. André Fischer
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Computer Science, IBBT-DistriNet, K.U. Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium

    Bart De Decker

  2. School of Computing, University of Kent, CT2 7NZ, Canterbury, Kent, UK

    David W. Chadwick

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 IFIP International Federation for Information Processing

About this paper

Cite this paper

Franz, E., Pfennig, S., Fischer, A. (2012). Efficiency of Secure Network Coding Schemes. In: De Decker, B., Chadwick, D.W. (eds) Communications and Multimedia Security. CMS 2012. Lecture Notes in Computer Science, vol 7394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32805-3_12

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-32805-3_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32804-6

  • Online ISBN: 978-3-642-32805-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature