Skip to main content
Log in

Security analysis and improvement of a tag encoding authentication scheme for network coding

  • Computer Science
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

A tag encoding authentication scheme for network coding proposed by Wu et al was claimed to defend pollution attacks efficiently. However, we find that the scheme easily incurs multi-generation pollution attacks, where an adversary may be able to recover the main secret key of the source with high probability during multi-generation transmitting, and the scheme also cannot resist against inter-generation pollution attacks. Using a dynamic source secret key technology that the key can be updated with the change of generation identifier, an improved scheme is then presented, which can counteract these security defects without any efficiency compromise.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ahlswede R, Cai N, Li S-Y R, et al. Network information flow[J]. IEEE Transactions on Information Theory, 2000, 46(4):1204–1216.

    Article  Google Scholar 

  2. Ho T, Médard M, Koetter R, et al. A random linear network coding approach to multicast[J]. IEEE Transactions on Information Theory, 2006, 52(10): 4413–4430.

    Article  Google Scholar 

  3. Médard M, Sprintson A. Network Coding: Fundamentals and Applications[M]. New York: Academic Press, 2011.

    Google Scholar 

  4. Ho T, Leong B, Koetter R, et al. Byzantine modification detection in multicast networks using randomized network coding [J]. IEEE Transactions on Information Theory, 2008, 54(6): 2798–2803.

    Article  Google Scholar 

  5. Jaggi S, Langberg M, Katti S, et al. Resilient network coding in the presence of Byzantine adversaries [J]. IEEE Transactions on Information Theory, 2008, 54(6): 2596–2603.

    Article  Google Scholar 

  6. Koetter R, Kschischang F R. Coding for errors and erasures in random network coding [J]. IEEE Transactions on Information Theory, 2008, 54(8): 3579–3591.

    Article  Google Scholar 

  7. Dong J, Curtmola R, Nita-Rotaru C. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks [C] //Proceedings of the Second ACM Conference on Wireless Network Security. New York: ACM Press, 2009: 111–122.

    Chapter  Google Scholar 

  8. Kim M J, Medard M, Barros J. Algebraic watchdog: mitigating misbehavior in wireless network coding [J]. IEEE Journal on Selected Areas in Communications, 2011, 29(10): 1916–1925.

    Article  Google Scholar 

  9. Kehdi E, Li B. Null keys: Limiting malicious attacks via null space properties of network coding [C] // Proceedings of INFOCOM. Washington D C: IEEE Press, 2009: 1224–1232.

    Google Scholar 

  10. Gkantsidis C, Rodriguez P. Cooperative security for network coding file distribution [C] // Proceedings of INFOCOM. Washington D C: IEEE Press, 2006: 1–13.

    Google Scholar 

  11. Boneh D, Freeman D, Katz J, et al. Signing a linear subspace: Signature schemes for network coding [C] // Proceedings of Public Key Cryptography (PKC). Berlin: Springer-Verlag, 2009: 68–87.

    Google Scholar 

  12. Liu G, Wang B. Secure network coding against intra/ intergeneration pollution attacks [J]. China Communications, 2013, 10(8): 100–110.

    Article  Google Scholar 

  13. Jiang Y, Zhu H, Shi M, et al. An efficient dynamic-identity based signature scheme for secure network coding [J]. Computer Networks, 2010, 54(1): 28–40.

    Article  Google Scholar 

  14. Zhang P, Jiang Y, Lin C, et al. Padding for orthogonality: efficient subspace authentication for network coding [C] // Proceedings of INFOCOM. Washington D C: IEEE Press, 2011: 1026–1034.

    Google Scholar 

  15. Li Y, Yao H, Chen M, et al. RIPPLE Authentication for Network Coding [C] // Proceedings of INFOCOM. Washington D C: IEEE Press, 2010: 1–9.

    Google Scholar 

  16. Agrawa S, Boneh D. Homomorphic MACs: MAC-Based Integrity for Network Coding [C] // Proceedings of Applied Cryptography and Network Security. Paris: Springer-Verlag, 2009: 292–305.

    Chapter  Google Scholar 

  17. Cheng C, Jiang T, Zhang Q. TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding [J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 291–298.

    Article  Google Scholar 

  18. Newell A, Dong J, Nita-Rotaru C. On the practicality of cryptographic defences against pollution attacks in wireless network coding [J]. ACM Computing Surveys (CSUR), 2013, 45(3): 39.

    Article  Google Scholar 

  19. Wu X, Xu Y, Yuen C, et al. A tag encoding scheme against pollution attack to linear network coding [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 33–42.

    Article  Google Scholar 

  20. Gohberg I, OlshevskyV. Fast algorithms with preprocessing for matrix-vector multiplication problems [J]. Journal of Complexity, 1994, 10(4): 411–427.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangjun Liu.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (61271174, 61301178), the Specific Scientific Research Plan Project of Shaanxi Education Department (15JK2150) and the Science and Technology Innovation Foundation of Xi’an (CXY1352WL28, CXY1531WL38)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, G. Security analysis and improvement of a tag encoding authentication scheme for network coding. Wuhan Univ. J. Nat. Sci. 21, 394–398 (2016). https://doi.org/10.1007/s11859-016-1186-1

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-016-1186-1

Keywords

CLC number

Navigation