Title :
A Multiple-MAC-Based Protocol to Identify Misbehaving Nodes in Network Coding
Author :
Corena, Juan Camilo ; Ohtsuki, Tomoaki
Author_Institution :
Grad. Sch. of Sci. & Technol., Keio Univ., Yokohama, Japan
Abstract :
In network coding, intermediate nodes are allowed to transmit a function of the packets, instead of the traditional scheme where unmodified packets travel through the network. Some of the advantages of this mechanism are: a unified way to represent Broadcast, Multicast and Unicast, robustness in link and node failures and robustness to routing loops. However, allowing intermediate nodes to change information, introduces new points where byzantine attackers may try to disrupt the network. In this paper, we present a Message Authentication Code (MAC) Based protocol which can identify misbehaving nodes. Our construction uses only fast symmetric cryptographic operations, making it suitable for multicast networks, where latency is an important factor. For its construction, we used an efficient key assignment based on Blom´s scheme, and a Merkle tree to provide authenticity during our identification routine. We show our construction is relevant in the context of network coding, by showing its execution time compared to that of pollution detection routines and other schemes used for authentication.
Keywords :
access protocols; cryptographic protocols; multicast communication; network coding; MAC based protocol; Merkle tree; identify misbehaving nodes; intermediate nodes; message authentication code; multicast networks; multiple-MAC-based protocol; network coding; pollution detection routines; routing loops; unmodified packets; Authentication; Cryptography; Network coding; Pollution; Proposals; Protocols;
Conference_Titel :
Vehicular Technology Conference (VTC Fall), 2012 IEEE
Conference_Location :
Quebec City, QC
Print_ISBN :
978-1-4673-1880-8
Electronic_ISBN :
1090-3038
DOI :
10.1109/VTCFall.2012.6399271