Security Analysis and Improvement of a Tag Encoding Authentication Scheme for Network Coding

被引:1
|
作者
LIU Guangjun [1 ]
机构
[1] School of Information Engineering, Xi’an University
基金
中国国家自然科学基金;
关键词
network coding; pollution attack; inter-generation pollution attack; multi-generation pollution attack;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
A tag encoding authentication scheme for network coding proposed by Wu et al was claimed to defend pollution attacks efficiently. However, we find that the scheme easily incurs multi-generation pollution attacks, where an adversary may be able to recover the main secret key of the source with high probability during multi-generation transmitting, and the scheme also cannot resist against inter-generation pollution attacks. Using a dynamic source secret key technology that the key can be updated with the change of generation identifier, an improved scheme is then presented, which can counteract these security defects without any efficiency compromise.
引用
收藏
页码:394 / 398
页数:5
相关论文
共 50 条
  • [21] Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network
    Xie, Yong
    Wu, Libing
    Kumar, Neeraj
    Shen, Jian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 93 (02) : 523 - 541
  • [22] Improvement on an optimized protocol for mobile network authentication and security
    Chang, CC
    Lee, JS
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 538 - 541
  • [23] Shadow Encoding Scheme A smart line coding scheme for network communication
    Rizwan, Abdul Rasheed
    Ali, Tariq
    2017 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT), 2017, : 321 - 326
  • [24] Analysis and Design of Group RFID Tag Security Authentication Protocol
    Zang, Ke
    Xu, He
    Zhu, Feng
    Li, Peng
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2019), 2020, 993 : 637 - 645
  • [25] Security Analysis and Enhancements of a User Authentication Scheme
    Liu, Wan-Rong
    He, Xin
    Ji, Zhi-Yong
    International Journal of Network Security, 2021, 23 (05): : 895 - 903
  • [26] Performance Analysis of Tag Embedded Based Message Authentication Scheme
    Qaisi, Malak
    Althunibat, Saud
    Qaraqe, Marwa
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [27] An improvement of authentication test for security protocol analysis
    Li, Xiangdong
    Wang, Qingxian
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 745 - 748
  • [28] Security Analysis and Improvement of Fingerprint Authentication for Smartphones
    Jo, Young-Hoo
    Jeon, Seong-Yun
    Im, Jong-Hyuk
    Lee, Mun-Kyu
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [29] A New Homomorphic Message Authentication Code Scheme for Network Coding
    Kamal, Ahmed
    Dahshan, Hisham
    Elbayoumy, Ashraf D.
    2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020), 2020, : 520 - 524
  • [30] Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding"
    Li, Chen
    Lu, Rongxing
    Li, Hui
    Chen, Le
    Li, Xiaoqing
    IEEE COMMUNICATIONS LETTERS, 2014, 18 (12) : 2129 - 2132