当前位置: X-MOL 学术J. Syst. Archit. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification
Journal of Systems Architecture ( IF 4.5 ) Pub Date : 2021-02-08 , DOI: 10.1016/j.sysarc.2021.102051
Tandoh Lawrence , Fagen Li , Ikram Ali , Michael Y. Kpiebaareh , Charles R. Haruna , Tandoh Christopher

Authentication schemes based on homomorphic message authentication codes (HMACs) with or without a homomorphic cryptographic signature (HCS) have always played a vital role in network coding (NC). A newly developing trend with respect to research in this area takes authentication in NC-compatible networks beyond error detection. Current HMAC-based authentication schemes for networks that support NC not only detect and drop corrupted packets but also identify the rogue nodes that begun the attack. However, in order to completely optimize the performance of an NC-enabled network, nodes that identify corrupted packets should also be able to correct the errors. Doing this eliminates the communication cost associated with the need for re-transmission and improves throughput. In this paper we propose what to the best of our knowledge is the first of such HMAC-based authentication schemes. Like all current state of the art HMAC-based authentication schemes, the proposed scheme is able to identify pollution attacks and the nodes that launched them. Furthermore, the proposed scheme is also able to correct the corruption. This according to our evaluation improves the throughput of the network when compared to other similar state of the art schemes that do not possess this feature.



中文翻译:

基于HMAC的网络编码身份验证方案,支持纠错和恶意节点识别

基于带有或不带有同态密码签名(HCS)的同态消息认证码(HMAC)的认证方案在网络编码(NC)中始终发挥着至关重要的作用。关于该领域研究的一种新发展趋势是在NC兼容网络中进行身份验证,而不仅仅是错误检测。当前用于支持NC的网络的基于HMAC的身份验证方案不仅可以检测和丢弃损坏的数据包,还可以识别开始攻击的恶意节点。但是,为了完全优化启用NC的网络的性能,标识损坏数据包的节点也应该能够纠正错误。这样做消除了与重传需求相关的通信成本,并提高了吞吐量。在本文中,我们提出了我们所知,这是此类基于HMAC的身份验证方案中的第一个。像所有当前所有基于HMAC的最新身份验证方案一样,提出的方案也能够识别污染攻击和发起这些攻击的节点。此外,所提出的方案还能够纠正损坏。根据我们的评估,与不具备此功能的其他类似技术水平的方案相比,它可以提高网络的吞吐量。

更新日期:2021-02-19
down
wechat
bug