ERSS-RLNC

作者: Hassan Noura , Steven Martin , Khaldoun Al Agha , Khaled Chahine

DOI: 10.1016/J.COMNET.2014.09.013

关键词:

摘要: Random Linear Network Coding (RLNC) is a promising technology of (NC) that has been proved to be both sufficient and efficient. To enable the deployment RLNC in real networks, this paper first introduces new efficient flexible authentication-encryption scheme immune Byzantine eavesdropping attacks. The proposed achieves simultaneously information confidentiality, packet integrity source authentication with minimum computational complexity memory consumption. It also presents technique for constructing an integer Global Encoding Matrix (GEM) satisfies inversion property dynamic manner. In addition, uses keys ensure robustness against Secondly, implementation Binary RLNC, suitable battery constrained mobile devices low capabilities such as phones sensors, defined. effectiveness coding process by modifying Galois field calculation from (int8, int16) binary. Not only does requirements, high throughput energy consumption, but reduces statistical characteristics process. obtained theoretical experimental results show secure compared many recent works field.

参考文章(31)
Krishna R. Narayanan, Kapil Bhattad, Weakly Secure Network Coding ,(2005)
Henri Gilbert, Helena Handschuh, Security Analysis of SHA-256 and Sisters Selected Areas in Cryptography. ,vol. 3006, pp. 175- 193 ,(2004) , 10.1007/978-3-540-24654-1_13
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Ahmed Fathy, Tamer ElBatt, Moustafa Youssef, A source authentication scheme using network coding International Journal of Security and Networks. ,vol. 6, pp. 101- 111 ,(2011) , 10.1504/IJSN.2011.043669
Don Johnson, Alfred Menezes, Scott Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA) International Journal of Information Security. ,vol. 1, pp. 36- 63 ,(2001) , 10.1007/S102070100002
Luisa Lima, Muriel Medard, Joao Barros, Random Linear Network Coding: A free cipher? international symposium on information theory. pp. 546- 550 ,(2007) , 10.1109/ISIT.2007.4557282
Mea Wang, Baochun Li, How Practical is Network Coding international workshop on quality of service. ,vol. 23, pp. 274- 278 ,(2006) , 10.1109/IWQOS.2006.250480
Luisa Lima, Joao P. Vilela, Joao Barros, Muriel Medard, An information-theoretic cryptanalysis of network coding - is protecting the code enough? international symposium on information theory and its applications. pp. 1- 6 ,(2008) , 10.1109/ISITA.2008.4895420