Energy Efficient Authentication Strategies for Network Coding

Anya Apavatjrut 1 Wassim Znaidi 1 Antoine Fraboulet 2 Claire Goursaud 1 Katia Jaffrès-Runser 1 Cédric Lauradoux 1, * Marine Minier 1
* Auteur correspondant
1 SWING - Smart Wireless Networking
Inria Grenoble - Rhône-Alpes, CITI - CITI Centre of Innovation in Telecommunications and Integration of services
2 AMAZONES - Ambient Middleware Architectures: Service-Oriented, Networked, Efficient and Secured
Inria Grenoble - Rhône-Alpes, CITI - CITI Centre of Innovation in Telecommunications and Integration of services
Abstract : Recent advances in information theory and networking, e.g. aggregation, network coding or rateless codes, have significantly modified data dissemination in wireless networks. These new paradigms create new threats for security such as pollution attacks and denial of services (DoS). These attacks exploit the difficulty to authenticate data in such contexts. The particular case of xor network coding is considered herein. We investigate different strategies based on message authentication codes algorithms (MACs) to thwart these attacks. Yet, classical MAC designs are not compatible with the linear combination of network coding. Fortunately, MACs based on universal hash functions (UHFs) match nicely the needs of network coding: some of these functions are linear h(x1⊕x2)=h(x1)⊕h(x2). To demonstrate their efficiency, we consider the case of wireless sensor networks (WSNs). Although these functions can drastically reduce the energy consumption of authentication (up to 68% gain over the classical designs is observed), they increase the threat of DoS. Indeed, an adversary can disrupt all communications by polluting few messages. To overcome this problem, a group testing algorithm is introduced for authentication resulting in a complexity linear in the number of attacks. The energy consumption is analyzed for cross-point and butterfly network topologies with respect to the possible attack scenarios. The results highlight the trade-offs between energy efficiency, authentication and the effective throughput for the different MAC modes.
Type de document :
Article dans une revue
Concurrency and Computation: Practice and Experience, Wiley, 2012, 24 (10), pp.1086-1107. 〈10.1002/cpe.1767〉
Liste complète des métadonnées

Littérature citée [43 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-00644484
Contributeur : Katia Jaffres-Runser <>
Soumis le : jeudi 24 novembre 2011 - 14:49:38
Dernière modification le : vendredi 22 décembre 2017 - 11:22:11
Document(s) archivé(s) le : samedi 25 février 2012 - 02:26:18

Fichier

CCPE-FINAL.pdf
Fichiers éditeurs autorisés sur une archive ouverte

Identifiants

Collections

Citation

Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Katia Jaffrès-Runser, et al.. Energy Efficient Authentication Strategies for Network Coding. Concurrency and Computation: Practice and Experience, Wiley, 2012, 24 (10), pp.1086-1107. 〈10.1002/cpe.1767〉. 〈hal-00644484〉

Partager

Métriques

Consultations de la notice

510

Téléchargements de fichiers

296