2016
DOI: 10.1109/tifs.2016.2515517
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(27 citation statements)
references
References 28 publications
0
27
0
Order By: Relevance
“…The study to ensure the security of network coding discussed in chapter 2 includes the method of applying cryptographic techniques such as encryption algorithms and digital signatures in [1,4,[8][9][10][11], the method of secure network coding proposed in [7,9,17], and the prevention of attacks by distinguishing the trusted nodes in [13,15]. In the method of applying a cryptographic technique, there is overhead such as key exchange, and if an internal attacker modifies the packet and encrypts it with a correct key, the destination decrypts it and trusts the packet and executes the recovery for network coding.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The study to ensure the security of network coding discussed in chapter 2 includes the method of applying cryptographic techniques such as encryption algorithms and digital signatures in [1,4,[8][9][10][11], the method of secure network coding proposed in [7,9,17], and the prevention of attacks by distinguishing the trusted nodes in [13,15]. In the method of applying a cryptographic technique, there is overhead such as key exchange, and if an internal attacker modifies the packet and encrypts it with a correct key, the destination decrypts it and trusts the packet and executes the recovery for network coding.…”
Section: Resultsmentioning
confidence: 99%
“…In addition, Wu et al [10] proposed a method that verifies whether a packet is valid by applying a digital signature algorithm in case a network coding is used in a vehicular area network (VANET) and a vehicle cannot recover a message due to a pollution attack. Cheng et al showed that multi-generation pollution attacks are possible when homogeneous subspace signature schemes are used to cope with pollution attacks in network coding and described an algorithm that solves this problem by improving the key distribution method [11].…”
Section: Related Workmentioning
confidence: 99%
“…Nevertheless, this approach still relies on key pre-distribution. In [20] two improved key distribution schemes are proposed and analyzed in terms of computation and communications costs. The authors of [21] address a weakness of verificationbased techniques known as verification attack, whereby a large amount of content to be checked is injected at high rate in a named-data networking scenario.…”
Section: Related Workmentioning
confidence: 99%
“…The model we developed in Sec. V, through (19) and (20), allows us to predict the value of the honest score estimated by each node. As already discussed this amounts at estimating the system-wide parameters s h and s p .…”
Section: Honest Score Model Exploitationmentioning
confidence: 99%
“…Li et al [19] proposed to use a symmetric key based homomorphic MAC algorithms to detect corrupted packets. In [21], the authors analyzed and improved two homomorphic authentication schemes homomorphic subspace signature (HSS) [22] and key predistribution-based tag encoding (KEPTE) [23] for network coding.…”
Section: Related Workmentioning
confidence: 99%