A Novel Homomorphic Against Intersession Coding attacks Using InterMac
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - August Issue 2013 by IJCTT Journal|
|Volume-4 Issue-8 |
|Year of Publication : 2013|
|Authors :P.Sravani, D.Deewena Raju|
P.Sravani, D.Deewena Raju "A Novel Homomorphic Against Intersession Coding attacks Using InterMac"International Journal of Computer Trends and Technology (IJCTT),V4(8):2863-2867 August Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract:- – Network coding allows intermediate nodes to encode data packets, which increases network throughput and enhances robustness. However, once the node injects corrupted data blocks into a network, the polluted data blocks will propagate quickly with network coding. In the existing approach a new homomorphic MAC scheme called SpaceMac, which makes it possible for an intermediate node validating whether received packets remain in a selected subspace, even when the subspace is expanding eventually. Then, by using SpaceMac to be the building block to develop a cooperative scheme that gives complete defense against pollution attacks: (i) it might detect polluted packets early at intermediate nodes, and (ii) it could know the exact location of every, even colluding, attackers, thereby making it a possibility to eliminate them. This system fails to detects the malicious attacks in inter-session attacks of souce packets. In this proposed work, we`ll ?rst de?ne precisely damaged packets in inter-session pollution based on the commitment of a given source packets. Within this system a new detection scheme: one hash-based and other MAC-based schemes i.e(Improved InterMac and SpaceMac). InterMac is the ?rst multisource homomorphic HMAC scheme that supports multiple keys. All schemes provide in-network detection, are collusion-resistant, and have very low online bandwidth and computation overhead.
 Multi-receiver Authentication Code for Network Coding Fr´ed´erique Oggier and Hanane Fathi, Forty-Sixth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 23-26, 2008
 Padding for Orthogonality: Efficient Subspace Authentication for Network Coding Peng Zhang, IEEE INFOCOM 2011
 Y. Wu, P. A. Chou, and S.-Y. Kung, "Minimum energy multicast in mobile ad hoc networks using network coding," IEEE Trans. On Communications, vol. 54, no. 11, Nov. 2005.
 T. Ho, R. Koetter, M. Medard, D. Karger, and M. Effros, "The benefits of coding over routing in a randomized setting," in Proc. of IEEE International Symposium on Iriformation Theory, Jun. 2003.
 C. Gkantsidis and P. Rodriguez, "Network coding for large scale file distribution," in Proc. of IEEE INFOCOM, Mar. 2005.
 J. Dong, R. Curtmola, and C. Nita-Rotaru, “Practical defenses against pollution attacks in intra-flow network coding for wireless mes networks,” in Proc. Second ACM Conference on Wireless Network Security, 2009.
 R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin, “Secure network coding over the integers,” in Proc. International Conference on Practice and Theory in Public Key Cryptography, 2010.
 M. Krohn, M. Freedman, and D. Mazieres, “On-the-fly verification of rateless erasure codes for efficient content distribution,” in Proc. IEEE Symposium on Security and Privacy, 2004.
Keywords : — SpaceMac, Packet Session, Node, MaliciousNodes ,Pollutant Attack.