Security Analysis and Improvement of a Tag Encoding Authentication Scheme for Network Coding

被引:1
|
作者
LIU Guangjun [1 ]
机构
[1] School of Information Engineering, Xi’an University
基金
中国国家自然科学基金;
关键词
network coding; pollution attack; inter-generation pollution attack; multi-generation pollution attack;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
A tag encoding authentication scheme for network coding proposed by Wu et al was claimed to defend pollution attacks efficiently. However, we find that the scheme easily incurs multi-generation pollution attacks, where an adversary may be able to recover the main secret key of the source with high probability during multi-generation transmitting, and the scheme also cannot resist against inter-generation pollution attacks. Using a dynamic source secret key technology that the key can be updated with the change of generation identifier, an improved scheme is then presented, which can counteract these security defects without any efficiency compromise.
引用
收藏
页码:394 / 398
页数:5
相关论文
共 50 条
  • [31] Security analysis and improvement of a multi-factor biometric-based remote authentication scheme
    Boonkrong, Sirapat
    IAENG International Journal of Computer Science, 2019, 46 (04): : 1 - 12
  • [32] Joint channel coding-network coding scheme with low encoding complexity
    Xu, Jun
    Tong, Ningning
    Zhao, Danfeng
    Zhou, Xiangchao
    ICIC Express Letters, 2014, 8 (09): : 2511 - 2516
  • [33] Security enhanced user authentication scheme for wireless sensor network
    Jannati, Hoda
    Falahati, Abolfazl
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 215 - 228
  • [34] Security Improvement on a Remote User Authentication Scheme Using Smart Cards
    Chen, Tien-Ho
    Hsiang, Han-Cheng
    Shih, Wei-Kuan
    INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 9 - +
  • [35] Cryptanalysis and improvement of authentication scheme for roaming service in ubiquitous network
    Khatoon, Shaheena
    Singh Thakur, Balwant
    CRYPTOLOGIA, 2020, 44 (04) : 315 - 340
  • [36] Security analysis of practical anonymous user authentication scheme with security proof
    Liu, Chenglian
    Lin, Changlu
    Sun, Shuliang
    Information Technology Journal, 2013, 12 (03) : 522 - 525
  • [37] Security analysis of authentication scheme with anonymity for wireless environments
    Wei, Yongzhuang
    Qiu, Hongbing
    Hu, Yupu
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 535 - +
  • [38] Security analysis and enhancements of a remote user authentication scheme
    Cao, Shou-Qi
    Sun, Qing
    Cao, Li-Ling
    International Journal of Network Security, 2019, 21 (04) : 661 - 669
  • [39] Security analysis on anonymous mutual authentication protocol for RFID tag without back-end database and its improvement
    Kim, Songyi
    Lee, Kwangwoo
    Kim, Seungjoo
    Won, Dongho
    World Academy of Science, Engineering and Technology, 2009, 35 : 460 - 464
  • [40] A computationally efficient HMAC-based authentication scheme for network coding
    Tandoh Lawrence
    Fagen Li
    Ikram Ali
    Charles R. Haruna
    Michael Y. Kpiebaareh
    Tandoh Christopher
    Telecommunication Systems, 2022, 79 : 47 - 69