Security Analysis and Improvement of a Tag Encoding Authentication Scheme for Network Coding

被引:1
|
作者
LIU Guangjun [1 ]
机构
[1] School of Information Engineering, Xi’an University
基金
中国国家自然科学基金;
关键词
network coding; pollution attack; inter-generation pollution attack; multi-generation pollution attack;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
A tag encoding authentication scheme for network coding proposed by Wu et al was claimed to defend pollution attacks efficiently. However, we find that the scheme easily incurs multi-generation pollution attacks, where an adversary may be able to recover the main secret key of the source with high probability during multi-generation transmitting, and the scheme also cannot resist against inter-generation pollution attacks. Using a dynamic source secret key technology that the key can be updated with the change of generation identifier, an improved scheme is then presented, which can counteract these security defects without any efficiency compromise.
引用
收藏
页码:394 / 398
页数:5
相关论文
共 50 条
  • [41] A bandwidth efficient HMAC-based authentication scheme for network coding
    Lawrence, Tandoh
    Ali, Ikram
    Christopher, Tandoh
    Li, Fagen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55 (55)
  • [42] A computationally efficient HMAC-based authentication scheme for network coding
    Lawrence, Tandoh
    Li, Fagen
    Ali, Ikram
    Haruna, Charles R.
    Kpiebaareh, Michael Y.
    Christopher, Tandoh
    TELECOMMUNICATION SYSTEMS, 2022, 79 (01) : 47 - 69
  • [43] Tag ID Subdivision Scheme for Efficient Authentication and Security-Enhancement of RFID System in USN
    Lee, Kijeong
    Park, Byungjoo
    Park, Gil-Cheol
    INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 64 - 71
  • [44] On the Security of the Algebraic Eraser Tag Authentication Protocol
    Blackburn, Simon R.
    Robshaw, M. J. B.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 3 - 17
  • [45] Security Analysis and Improvement on Two RFID Authentication Protocols
    Wang, Shaohui
    Liu, Sujuan
    Chen, Danwei
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (01) : 21 - 33
  • [46] Security Analysis and Improvement on Two RFID Authentication Protocols
    Shaohui Wang
    Sujuan Liu
    Danwei Chen
    Wireless Personal Communications, 2015, 82 : 21 - 33
  • [47] Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'
    Islam, S. K. Hafizul
    Khan, Muhammad Khurram
    Li, Xiong
    PLOS ONE, 2015, 10 (08):
  • [48] Analysis and Improvement of an Authentication Scheme for Fog Computing Services
    HUO Yuyan
    KANG Baoyuan
    NIU Shufang
    LI Anqian
    ZUO Xinyu
    WuhanUniversityJournalofNaturalSciences, 2024, 29 (03) : 209 - 218
  • [49] Provable Security Certificateless Authentication Scheme for Vehicular Ad hoc Network
    Zeng Ping
    Guo Ruifang
    Ma Yingjie
    Gao Yuan
    Zhao Geng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (12) : 2873 - 2881
  • [50] On the security of a lightweight authentication and encryption scheme for mobile ad hoc network
    Yap, Wun-She
    Liu, Joseph K.
    Tan, Syh-Yuan
    Goi, Bok-Min
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3094 - 3098