Browse > Article
http://dx.doi.org/10.7840/kics.2017.42.5.999

PNC(Pipeline Network Coding)-Based Message and Node Authentication in Wireless Networks  

Ahn, Myeong-Gi (LIG Nex1 Co., Ltd.)
Cho, Young-Jong (Ajou University Department of Software and Computer Engineering)
Kang, Kyungran (Ajou University Department of Software and Computer Engineering)
Abstract
In this paper, we propose a pipeline network coding (PNC) scheme for efficient data transmission in wireless networks, a data authentication scheme for verifying the integrity of data, and a node authentication scheme for a virtual source. PNC is a technique that improves the overall network performance by relaying data such that the relay node performing network coding transmits to the sender instead. However, network coding is vulnerable to a pollution attack, which is an attack by a malicious attacker to inject modified data into the network. To prevent this, hash-based message authentication code (HMAC) is used. For this purpose, in order to generate a tag used for data authentication, a key must be distributed to the nodes performing authentication. We applied a hash chain to minimize the overhead of key distribution. A null vector is used as the authentication scheme for the virtual source. Finally, we analyze the safety and complexity of the proposed scheme and show he performance through simulation.
Keywords
Network Coding; Wireless Network; HMAC; Null-vector; Authentication;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 R. Ahlswede, N. Cai, S. Li, and R. Yeung, "Network information flow," Inf. Theory, vol. 46, no. 4, pp. 1204-1216, Jul. 2000.   DOI
2 T. Ho, M. Medard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast," Inf. Theory, vol. 52, no. 10, pp. 4413-4430, Oct. 2003.
3 A. K. Haddad and R. H. Riedi, "Bounds on the benefit of network coding for wireless multicast and unicast," IEEE Trans. Mob. Comput., vol. 13, no. 1, pp. 102-115, Jan. 2014.   DOI
4 K. H. Lee and J. H. Kim, "Random linear network coding to improve reliability in the satellite communication," J. KICS, vol. 38B, no. 9, pp. 700-706, Sept. 2013.   DOI
5 X. Yang, X. Tao, E. Dutkiewicz, E. X. Huang, Y. J. Guo, and Q. Cui, "Energy-efficient distributed data storage for wireless sensor networks based on compressed sensing and network coding," IEEE Trans. Wirel. Commun., vol. 12, no. 10, pp. 5087-5099, Oct. 2013.   DOI
6 D. H. Lee, W. H. Lee, S. M. Kang, and H. Y. Hwang, "Frequency allocation and path selection scheme in underlay cognitive radio networks using network coding," J. KICS, vol. 40, no. 12, pp. 2372-2380, Dec. 2015.   DOI
7 P. Li, S. Guo, S. Yu, and A. V. Vasilakos, "Reliable multicast with pipelined network coding using opportunistic feeding and routing," IEEE Trans. Parall. Distrib. Syst., vol. 25, no. 12, pp. 3264-3273, Dec. 2014.   DOI
8 S. Chachulski, M. Jennings, S. Katti, and D. Katabi, "Trading structure for randomness in wireless opportunistic routing," in Proc. ACM SIGCOMM, pp. 169-180, 2007.
9 R. Punnoose, P. Nikitin, and D. Stancil, "Efficient simulation of ricean fading within a packet simulator," in Proc. IEEE 52nd Veh. Technol. Conf., pp. 764-767, 2000.
10 E. Kehdi, et. al., "Null keys: Limiting malicious attacks via null space properties of network coding," in Proc. Infocom, pp. 1224-1232, Apr. 2009.
11 A. Newell and C. Nita-Rotaru, "Split null keys: A null space based defense for pollution attacks in wireless network coding," in Proc. SECON, pp. 479-487, 2012.
12 C. Chi, J. Tao, and Z. Qian, "TESLA-Based homomorphic MAC for authentication in P2P system for live streaming with network coding," IEEE J. Sel. Areas in Commun., vol. 31, no. 9, pp. 291-298, Sept. 2013.   DOI
13 Z. Rongfei, J. Yixin, L. Chuang, F. Yanfei, and S. S. Xuemin, "A distributed Fault/Intrusion-Tolerant sensor data storage scheme based on network coding and homomorphic fingerprinting," IEEE Trans. Parall. Distrib. Syst., vol. 23, no. 10, pp. 1819-1830, Oct. 2012.   DOI
14 X. Wu, Y. Xu, C. Yuen, and L. Xiang, "A tag encoding scheme against pollution attack to linear network coding," IEEE Trans. Parall. Distrib. Syst., vol. 25, no. 1, pp. 33-42, Jan. 2014.   DOI
15 L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.   DOI
16 J. Liu, et. al., "Efficient multicast key distribution using HOWP-based dynamic group access structures," IEEE Trans. Computers, vol. 62, no. 8, Aug. 2013.