IJRIT International Journal of Research in Information Technology, Volume 1, Issue 1, January 2013, Pg. 42-47

International Journal of Research in Information Technology (IJRIT) (IJRIT) www.ijrit.com

ISSN 2001-5569

A Secure and Robust Authentication Scheme against Pollution Attacks B. Ramulu1, CH. Ravinder Reddy2 1

Assistant Professor, Department of MCA, Teegala Krishna Reddy Engineering College Hyderabad, Andhra Pradesh, India [email protected]

2

Assistant Professor, Department of MCA, Teegala Krishna Reddy Engineering College Hyderabad, Andhra Pradesh, India [email protected]

Abstract The pollution attacks are amplified by the network coding process, resulting in a greater damage than under traditional routing. In this paper, this issue is handled by designing an unconditionally secure authentication code suitable for multicast network coding, where the keying material is initially computed and distributed by a trusted authority to the destinations and intermediate nodes. The proposed scheme allows not only destinations, but also intermediate nodes, to verify the integrity and origin of the packets received without having to decode, and thus detect and discard the malicious messages in transit that fail the verification. This way, the pollution is canceled out before reaching the destinations. Systems exploiting network coding to increase their throughput suffer greatly from pollution attacks, which consist of injecting malicious packets in the network. The proposed scheme is robust against pollution attacks from outsiders, as well as coalitions of malicious insider nodes, which have the ability to perform the integrity check, but instead get corrupted and use their knowledge to themselves attack the network. We analyze the performance of the scheme in terms of both throughput and good put. Keywords- Network Coding, Authentication Scheme, Key Distribution, Pollution Attacks. Full Text: https://sites.google.com/site/ijrit1/home/V1I115.pdf

B. Ramulu et al, IJRIT

A Secure and Robust Authentication Scheme against ...

Hyderabad, Andhra Pradesh, India [email protected]. 2Assistant Professor, Department of MCA, Teegala Krishna Reddy Engineering College. Hyderabad, Andhra Pradesh, India [email protected]. Abstract. The pollution attacks are amplified by the network coding process, resulting in a greater damage ...

22KB Sizes 0 Downloads 253 Views

Recommend Documents

A Secure and Robust Authentication Scheme against ...
content distribution in peer-to-peer networks to distributed file storage systems. .... swarming with network coding,” Microsoft Research, Cambridge, U.K. [Online].

Robust Anonymous Authentication Scheme without ...
ious internet services and resources by using his/her mobile device anytime and ... ing service that mobile users can access the services provided by the home ...

A bidirectional Bluetooth authentication scheme ...
[email protected] ... Game theory is a branch of mathematics and logic which deals with the analysis of ... Bluetooth is a short-range wireless cable.

A hash-based authentication scheme for SIP against off ...
multimedia services on both wired as well as wireless network. SIP ... other well-known Internet is suggested, such as, HTTP Digest Authentication (HTTP.

Secure and Serverless RFID Authentication and Search ...
RFID search, and suggest several solutions. ... exchange random numbers, nr and nt, at the start of the query. ...... tology ePrint Archive, Report 2006/227.

Secure and Serverless RFID Authentication and Search ...
{cct,shengbo,liqun}@cs.wm.edu. Department of .... reader forwards this metaID to the backend server .... ply back to a backend server to obtain the tag data.

A Robust and Secure RFID-Based Pedigree System
by reading in the digital signature and unique id. The pharmacist decrypts the signature with the public key, and compares the value against the hashed result.

A Robust and Secure RFID-Based Pedigree System - CiteSeerX
A Robust and Secure RFID-Based Pedigree. System (Short Paper). Chiu C. Tan and Qun Li. Department of Computer Science. College of William and Mary.

A source authentication scheme using network coding ...
trade-offs with the widely accepted throughput benefits, especially in multicast scenarios. .... network coding can be used to provide security measures.

A Key Management Scheme for Providing Secure ...
technology, Bluetooth has key distribution supports for secure multicasting over its unit one-hop network, piconet. Bluetooth core specification [1] defines basic ...

A Robust Acknowledgement Scheme for Unreliable Flows - CiteSeerX
net and the emergence of sensing applications which do not require full reliability ... can benefit from selective retransmissions of some but not all lost packets, due to ... tion or fading in a wireless network, or loss of ack packets in asymmetric

Robust Evidence and Secure Evidence Claims - Kent W. Staley
Jul 13, 2004 - discriminate one hypothesis from its alternatives count as evidence for that ... ontological dichotomy between different kinds of facts. ..... Because the W boson has a large mass, much of the energy released in top decay.

Compression Scheme for Faster and Secure Data ...
IDBE (Intelligent Dictionary Based Encoding) is used as a pre processing stage so as to improve the compression ratio and the rate of compression. The compression method suggested will greatly reduce the transmission time as well as the bandwidth req

An Efficient and Secure User Revocation Scheme in ...
a set of custom simulations built in Java. In the following, we detail .... fine-grained data access control in cloud computing,” in INFOCOM,. 2010, pp. 534–542.

A Robust Acknowledgement Scheme for Unreliable Flows - CiteSeerX
can benefit from selective retransmissions of some but not all lost packets, due to ... tion or fading in a wireless network, or loss of ack packets in asymmetric ...

On Robust Key Agreement Based on Public Key Authentication
explicitly specify a digital signature scheme. ... applies to all signature-based PK-AKE protocols. ..... protocol design and meanwhile achieve good efficiency.

Authentication Scheme with User Anonymity Based on ...
Anonymous authentication schemes on wireless environments are being widely ... the Internet, she/he can guess which access point the user connects, and she/he can also guess the ... three party structure: the authentication costs of home agent are ex

Enhanced DES Implementation Secure against High ...
Since Differential Power Analysis (DPA) on DES in smart- cards was ..... T.Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Soft- ware ...

Improved Secure Routing Scheme in WSN - International Journal of ...
we will assign keys manually with Hash Function which is Blowfish. ... Authentication and encryption based on symmetrical cryptography are lightweight security ...

Robust Key Management Scheme for Certification in ...
a certification service can be provided by at least t nodes. This solution ... This scheme relatively improves the CA service performances compared to [10].

Improved Secure Routing Scheme in WSN - International Journal of ...
evaluate the performance of Ad hoc On Demand Distance Vector (AODV) routing protocol for monitoring of critical conditions with the help of important metrics like delay, throughput and network load with different techniques in different scenarios for

Enhanced DES Implementation Secure against High ...
Key words: Smart-cards; DES; Simple power analysis (SPA); (High-Order). Differential .... More precisely, an n-th order DPA attack takes into account n values.

On Two DES Implementations Secure against ...
Oct 9, 2007 - To defend differential power analysis attacks, Akkar and ... its software or hardware implementations into consideration. However, electronic ...

Robust Watermarking Scheme Applied to Radiological ...
†The author is with the National Institute of Astro- physics, Optics and Electronics, Luis Enrique Erro No. 1. Sta. Maria Tonantzintla, Puebla, Mexico C.P. 72840 a) E-mail: [email protected] b) E-mail: [email protected] c) E-mail: jamartinez@inao