DocumentCode :
2005908
Title :
SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks
Author :
Itani, Wassim ; Ghali, César ; El Hajj, Ahmad ; Kayssi, Ayman ; Chehab, Ali
Author_Institution :
Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Beirut, Lebanon
fYear :
2010
fDate :
6-10 Dec. 2010
Firstpage :
1
Lastpage :
6
Abstract :
We present SinPack, a security protocol for preventing packet pollution attacks in network-coded content distribution networks. SinPack employs a homomorphically-addressable Bloom filter data structure to enforce the integrity of network-coded packets all the way from source to destination. Using a Bloom filter "amortizes" the functionality of traditional cryptographic integrity verification constructs (Message Authentication Codes, hash trees, digital signatures, etc) in a relatively small-sized data structure. This aids in reducing network traffic and, more significantly, allows the incremental integrity verification of out of order network packets. The novel homomorphic Bloom filter construction permits intermediate routers and destination end systems to verify the integrity of source packets even after being network-coded by routers. This methodology avoids the need to establish expensive and intricate trust relationships among the different network routers and ensures the authenticity of the integrity structures using a single source public-key operation. Moreover, SinPack not only allows the content downloader to immediately verify the integrity of coded packets, but also provides this capability to any intermediate router on the path to the destination. This helps in eliminating polluted packets in the network upstream closest to the source of attack and as a result contributes to a great reduction in bogus network traffic and hence sizeable energy savings.
Keywords :
data structures; filtering theory; network coding; protocols; public key cryptography; telecommunication network routing; telecommunication traffic; SinPack; bogus network traffic; cryptographic integrity verification; destination end systems; homomorphically-addressable Bloom filter data structure; intermediate routers; network routers; network-coded content distribution networks; network-coded packet integrity; packet pollution attack prevention; security protocol; single source public-key operation; small-sized data structure; Encryption; Filtering theory; Network coding; Peer to peer computing; Pollution; Routing protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE
Conference_Location :
Miami, FL
ISSN :
1930-529X
Print_ISBN :
978-1-4244-5636-9
Electronic_ISBN :
1930-529X
Type :
conf
DOI :
10.1109/GLOCOM.2010.5684305
Filename :
5684305
Link To Document :
بازگشت