Academic Journal

Energy Efficient Authentication Strategies for Network Coding

التفاصيل البيبلوغرافية
العنوان: Energy Efficient Authentication Strategies for Network Coding
المؤلفون: Apavatjrut, Anya, Znaidi, Wassim, Fraboulet, Antoine, Goursaud, Claire, Jaffrès-Runser, Katia, Lauradoux, Cédric, Minier, Marine
المساهمون: Smart Wireless Networking (SWING), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-CITI Centre of Innovation in Telecommunications and Integration of services (CITI), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA), Ambient Middleware Architectures: Service-Oriented, Networked, Efficient and Secured (AMAZONES)
المصدر: ISSN: 1532-0626 ; EISSN: 1532-0634.
بيانات النشر: HAL CCSD
Wiley
سنة النشر: 2012
المجموعة: Université de Rennes 1: Publications scientifiques (HAL)
مصطلحات موضوعية: Xor Network Coding, Pollution Attack, Denial of Services, MAC, Trees, Linear Universal Hash Functions, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
الوصف: International audience ; Recent advances in information theory and networking, e.g. aggregation, network coding or rateless codes, have significantly modified data dissemination in wireless networks. These new paradigms create new threats for security such as pollution attacks and denial of services (DoS). These attacks exploit the difficulty to authenticate data in such contexts. The particular case of xor network coding is considered herein. We investigate different strategies based on message authentication codes algorithms (MACs) to thwart these attacks. Yet, classical MAC designs are not compatible with the linear combination of network coding. Fortunately, MACs based on universal hash functions (UHFs) match nicely the needs of network coding: some of these functions are linear h(x1⊕x2)=h(x1)⊕h(x2). To demonstrate their efficiency, we consider the case of wireless sensor networks (WSNs). Although these functions can drastically reduce the energy consumption of authentication (up to 68% gain over the classical designs is observed), they increase the threat of DoS. Indeed, an adversary can disrupt all communications by polluting few messages. To overcome this problem, a group testing algorithm is introduced for authentication resulting in a complexity linear in the number of attacks. The energy consumption is analyzed for cross-point and butterfly network topologies with respect to the possible attack scenarios. The results highlight the trade-offs between energy efficiency, authentication and the effective throughput for the different MAC modes.
نوع الوثيقة: article in journal/newspaper
اللغة: English
Relation: hal-00644484; https://inria.hal.science/hal-00644484; https://inria.hal.science/hal-00644484/document; https://inria.hal.science/hal-00644484/file/CCPE-FINAL.pdf
DOI: 10.1002/cpe.1767
الاتاحة: https://inria.hal.science/hal-00644484
https://inria.hal.science/hal-00644484/document
https://inria.hal.science/hal-00644484/file/CCPE-FINAL.pdf
https://doi.org/10.1002/cpe.1767
Rights: info:eu-repo/semantics/OpenAccess
رقم الانضمام: edsbas.D924FE62
قاعدة البيانات: BASE