Abstract
Network coding is a promising approach for increasing performance of multicast data transmission and reducing energy costs. Of course, it is essential to consider security aspects to ensure a reliable data transmission. Particularly, pollution attacks may have serious impacts in network coding since a single attacker can jam large parts of the network. Therefore, various approaches have been introduced to secure network coding against this type of attack.
However, introducing security increases costs. Even though there are some performance analysis of secure schemes, to our knowledge there are no details whether these schemes are worthwhile to replace routing under the facet of efficiency. Thus, we discuss in this paper parameters to assess the efficiency of secure network coding schemes. Using three network graphs, we evaluate parameters focusing on communication overhead for selected schemes. Our results show that there are still benefits in comparison to routing depending on the network topology.
Chapter PDF
References
Ahlswede, R., Cai, N., Li, S.-Y.R., Yeung, R.W.: Network information flow. IEEE Trans. on Information Theory 46(4), 1204–1216 (2000)
Cai, N., Yeung, R.W.: Secure Network Coding. In: Proc. IEEE Int. Symp. on Information Theory (2002)
Chou, P.A., Wu, Y., Jain, K.: Practical network coding. In: Proc. Annual Allerton Conference on Communication, Control and Computing (2003)
Dong, J., Curtmola, R., Nita-Rotaru, C.: Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. In: Proc. WiSec (2009)
Dong, J., Curtmola, R., Nita-Rotaru, C.: Secure network coding for wireless mesh networks: Threats, challenges, and directions. Computer Communications 32, 1790–1801 (2009)
Fragouli, C., Le Boudec, J.-Y., Widmer, J.: Network coding: An instant primer. SIGCOMM Computer Communication Review 36, 63–68 (2006)
Fragouli, C., Soljanin, E.: Network Coding Applications. Now publishers (2007)
Fragouli, C., Soljanin, E.: Network Coding Fundamentals. Now publishers (2007)
Franz, E., Pfennig, S., Fischer, A.: Communication overhead of network coding schemes secure against pollution attacks. Technical Report TUD-FI12-07, TU Dresden (May 2012)
Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure Network Coding over the Integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 142–160. Springer, Heidelberg (2010)
Gkantsidis, C., Rodriguez, P.R.: Cooperative Security for Network Coding File Distribution. In: Proc. IEEE Int. Conf. on Computer Communications (2006)
Ho, T., Koetter, R., Médard, M., Karger, D.R., Effros, M.: The benefits of coding over routing in a randomized setting. In: Proc. of the IEEE International Symposium on Information Theory (2003)
Ho, T., Leong, B., Koetter, R., Médard, M., Effros, M., Karger, D.R.: Byzantine Modification Detection in Multicast Networks with Random Network Coding. IEEE Trans. on Information Theory 54(6), 2798–2803 (2008)
Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Médard, M.: Resilient network coding in the presence of byzantine adversaries. In: Proc. 26th Annual IEEE Conf. on Computer Commun., INFOCOM, pp. 616–624 (2007)
Lima, L., Vilela, J.P., Oliveira, P.F., Barros, J.: Network coding security: Attacks and countermeasures. CoRR, abs/0809.1366 (2008)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The TESLA broadcast authentication protocol. RSA CryptoBytes 5(2), 2–13 (2002)
Vilela, J.P., Lima, L., Barros, J.: Lightweight security for network coding. In: Proc. IEEE Int. Conf. on Communications (2008)
Wang, Y.: Insecure ”provably secure network coding” and homomorphic authentication schemes for network coding. IACR Eprint archive (2010)
Yeung, R.W.: Information Theory and Network Coding. Springer Publishing Company, Incorporated (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Franz, E., Pfennig, S., Fischer, A. (2012). Efficiency of Secure Network Coding Schemes. In: De Decker, B., Chadwick, D.W. (eds) Communications and Multimedia Security. CMS 2012. Lecture Notes in Computer Science, vol 7394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32805-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-32805-3_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32804-6
Online ISBN: 978-3-642-32805-3
eBook Packages: Computer ScienceComputer Science (R0)