By Peng Zhang, Chuang Lin
This ebook covers a sequence of protection and privateness concerns in community coding, and introduces 3 concrete mechanisms to deal with them. those mechanisms leverage conventional cryptographic primitives and nameless protocols, and are redesigned to slot into the hot framework of community coding. those 3 mechanisms are MacSig, a brand new message authentication approach for network-coded structures; P-Coding, a brand new encryption scheme to safe network-coding-based transmissions; and ANOC, a brand new nameless routing protocol that seamlessly integrates nameless routing with community coding.
Along with those 3 mechanisms, the authors offer a overview of community coding's merits, functions, and defense difficulties. additionally incorporated is an in depth review of safeguard matters within the box, with a proof of the way the safety matters range from these in conventional settings. whereas community coding may help increase community functionality, the adoption of community coding may be vastly constrained except safety and privateness threats are addressed.
Designed for researchers and pros, safeguard in community Coding explores significant demanding situations in community coding and gives functional options. Advanced-level scholars learning networking or method safeguard also will locate the content material valuable.
Read or Download Security in Network Coding PDF
Similar security books
This name provides security features accumulated from specialists in either the government and the personal quarter to assist safe an individual's own info and resources on-line.
Southern Africa has launched into one of many global? s such a lot formidable safety co-operation projects, looking to roll out the foundations of the United international locations at neighborhood degrees. This e-book examines the triangular courting among democratisation, the nature of democracy and its deficits, and nationwide safeguard practices and perceptions of 11 southern African states.
This ebook constitutes the refereed complaints of the fifth Australasian convention on details defense and privateness, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000. The 37 revised complete papers provided including invited contributions have been conscientiously reviewed and chosen from a complete of eighty one submissions.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed court cases of the 20 th eu Symposium on study in laptop safeguard, ESORICS 2015, held in Vienna, Austria, in September 2015. The fifty nine revised complete papers offered have been rigorously reviewed and chosen from 298 submissions. The papers deal with concerns similar to networks and net protection; procedure protection; crypto program and assaults; possibility research; privateness; cloud safety; protocols and attribute-based encryption; code research and side-channels; detection and tracking; authentication; regulations; and utilized defense.
- Emerging Threats to Energy Security and Stability
- Defence and Consensus: The Domestic Aspects of Western Security
- Rethinking the just war tradition
- The future security environment in the Middle East: conflict, stability, and political change, Issue 1640
Extra resources for Security in Network Coding
N per generation using Clearly, using this approach, we don’t have to pre-distribute v’s a secure channel; we just need m tags which cause no startup latency. 3 Homomorphic Subspace Authentication 25 m+n ... m . . . m+n+1 Random Sampling . . Source packets v Padding 0 0 0 × ... . m+n+1 0 ... . V 0 . . 0 ... Fig. 1 Illustration of the “padding for orthogonality” idea To make this approach function in the presence of Byzantine adversaries, which attempt to forge tags for illegal packets, we consider the following two techniques.
Based on this idea, we propose a public keybased scheme and prove its security under the hardness assumption of discrete logarithm problem. In addition, we also propose a symmetric key-based scheme that is secure against a coalition of c adversaries. Most importantly, we carefully combine them to propose MacSig—the first hybrid key-based approach to network coding authentication. The MacSig scheme offers the following primary features: • Security against pollution. It can effectively not only thwart normal pollution attacks but also resist tag pollution presented in .
Under this idea, we propose a signature-based scheme HSS. HSS doesn’t need to pre-distribute signatures for each generation and hence incurs no startup latency. We also propose a MAC-based scheme HSM, which employs a double-random key distribution approach. The main advantages of HSM is that the number of MACs attached to each packet scales with the network size. By utilizing the techniques of both HSS and HSM, we finally propose a hybrid key-based authentication scheme MacSig. We demonstrate that the MacSig scheme can effectively resist both normal pollution and tag pollution attacks, while incurring a relatively low overhead in bandwidth and computation.
Security in Network Coding by Peng Zhang, Chuang Lin