SERS: Secure & Efficient Random and Symbol Linear Network Coding Schemes

Recently, several security schemes for Random Linear Network Coding (RLNC) have been proposed to increase the immunity of the RLNC technology against security attacks. One of the presented security schemes aims at securing the Global Encoding Vectors (GEV) that use other vectors to maintain the prop...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:International Wireless Communications and Mobile Computing Conference (Online) s. 1022 - 1029
Hlavní autoři: Salman, Ola, Noura, Hassan, Chehab, Ali
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 27.05.2024
Témata:
ISSN:2376-6506
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Recently, several security schemes for Random Linear Network Coding (RLNC) have been proposed to increase the immunity of the RLNC technology against security attacks. One of the presented security schemes aims at securing the Global Encoding Vectors (GEV) that use other vectors to maintain the proper encoding process of RLNC at intermediate nodes. However, this approach introduces overhead in terms of computational complexity (block cipher with multiple rounds and operations) and communication (2xn elements for each packet instead of n). To that end, this paper proposes a new scheme, S E R S, that overcomes the disadvantages and limitations of the existing security schemes by relying on a single GEV instead of two, which is the case of the original RLNC. The proposed scheme reduces the required computational complexity by eliminating AES encryption and by keeping the source RLNC encoding step as a secret. SERS is based on a dynamic key structure, and the introduced modifications result in a modern lightweight, and secure RLNC while achieving higher efficiency and minimizing the space of vulnerabilities. SERS exhibits minimal computational complexity and communication overhead, and it ensures message confidentiality and availability, in addition to source authentication when a homomorphic keyed hash function is employed. A second variant of the proposed scheme is also presented. The main advantages of the proposed scheme are that 1) it operates at the sub-generation level, 2) it can be implemented in parallel, and 3) it increases the security level by using different RLNC encoding matrices instead of just one.
ISSN:2376-6506
DOI:10.1109/IWCMC61514.2024.10592380