Subspace Authentication For Random Linear Network Coding

Peng Zhang,Chuang Lin
DOI: https://doi.org/10.1007/978-3-319-31083-1_3
2016-01-01
Abstract:As is introduced in Chap. 2, network coding is notoriously susceptible to pollution attacks: a single polluted packet can end up corrupting bunches of good ones. The mechanisms that we introduced previously either incur high computation/bandwidth overheads or cannot resist the tag pollution proposed recently. This chapter will present a novel idea termed padding for orthogonality for network coding authentication. Inspired by it, we design a public key-based signature scheme and a symmetric key-based MAC scheme, which can both effectively contain pollution attacks at forwarders. In particular, we combine them to propose a unified scheme termed MacSig, the first hybrid key cryptographic approach to network coding authentication. It can thwart both normal pollution and tag pollution attacks in an efficient way. Simulative results show that our MacSig scheme has a low bandwidth overhead and a verification process 2-4 times faster than typical signature-based solutions in some circumstances.
What problem does this paper attempt to address?