A Novel Homomorphic Against Intersession Coding attacks Using InterMac

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - August Issue 2013 by IJCTT Journal
Volume-4 Issue-8                           
Year of Publication : 2013
Authors :P.Sravani, D.Deewena Raju

MLA

P.Sravani, D.Deewena Raju "A Novel Homomorphic Against Intersession Coding attacks Using InterMac"International Journal of Computer Trends and Technology (IJCTT),V4(8):2863-2867 August Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:-  – Network coding allows intermediate nodes to encode data packets, which increases network throughput and enhances robustness. However, once the node injects corrupted data blocks into a network, the polluted data blocks will propagate quickly with network coding. In the existing approach a new homomorphic MAC scheme called SpaceMac, which makes it possible for an intermediate node validating whether received packets remain in a selected subspace, even when the subspace is expanding eventually. Then, by using SpaceMac to be the building block to develop a cooperative scheme that gives complete defense against pollution attacks: (i) it might detect polluted packets early at intermediate nodes, and (ii) it could know the exact location of every, even colluding, attackers, thereby making it a possibility to eliminate them. This system fails to detects the malicious attacks in inter-session attacks of souce packets. In this proposed work, we`ll ?rst de?ne precisely damaged packets in inter-session pollution based on the commitment of a given source packets. Within this system a new detection scheme: one hash-based and other MAC-based schemes i.e(Improved InterMac and SpaceMac). InterMac is the ?rst multisource homomorphic HMAC scheme that supports multiple keys. All schemes provide in-network detection, are collusion-resistant, and have very low online bandwidth and computation overhead.

 

References-

[1] Multi-receiver Authentication Code for Network Coding Fr´ed´erique Oggier and Hanane Fathi, Forty-Sixth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 23-26, 2008
[2] Padding for Orthogonality: Efficient Subspace Authentication for Network Coding Peng Zhang, IEEE INFOCOM 2011
[3] Y. Wu, P. A. Chou, and S.-Y. Kung, "Minimum energy multicast in mobile ad hoc networks using network coding," IEEE Trans. On Communications, vol. 54, no. 11, Nov. 2005.
[4] T. Ho, R. Koetter, M. Medard, D. Karger, and M. Effros, "The benefits of coding over routing in a randomized setting," in Proc. of IEEE International Symposium on Iriformation Theory, Jun. 2003.
[5] C. Gkantsidis and P. Rodriguez, "Network coding for large scale file distribution," in Proc. of IEEE INFOCOM, Mar. 2005.
[6] J. Dong, R. Curtmola, and C. Nita-Rotaru, “Practical defenses against pollution attacks in intra-flow network coding for wireless mes networks,” in Proc. Second ACM Conference on Wireless Network Security, 2009.
[7] R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin, “Secure network coding over the integers,” in Proc. International Conference on Practice and Theory in Public Key Cryptography, 2010.
[8] M. Krohn, M. Freedman, and D. Mazieres, “On-the-fly verification of rateless erasure codes for efficient content distribution,” in Proc. IEEE Symposium on Security and Privacy, 2004.

Keywords : —  SpaceMac, Packet Session, Node, MaliciousNodes ,Pollutant Attack.