Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016, Article ID 7145138, 8 pages
http://dx.doi.org/10.1155/2016/7145138
Research Article

A Secure Network Coding Based on Broadcast Encryption in SDN

1State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China
2China National Digital Switching, System Engineering and Technological Research Centre, Zhengzhou 450002, China

Received 30 October 2015; Revised 22 May 2016; Accepted 7 July 2016

Academic Editor: Aime’ Lay-Ekuakille

Copyright © 2016 Yue Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. A. A. Nunes, M. Mendonca, X.-N. Nguyen, K. Obraczka, and T. Turletti, “A survey of software-defined networking: past, present, and future of programmable networks,” IEEE Communications Surveys and Tutorials, vol. 16, no. 3, pp. 1617–1634, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. N. McKeown, T. Anderson, H. Balakrishnan et al., “OpenFlow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008. View at Publisher · View at Google Scholar
  3. R. Cohen, L. Lewin-Eytan, J. S. Naor, and D. Raz, “On the effect of forwarding table size on SDN network utilization,” in Proceedings of the 33rd IEEE Conference on Computer Communications (IEEE INFOCOM '14), pp. 1734–1742, Toronto, Canada, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Lara, A. Kolasani, and B. Ramamurthy, “Network innovation using open flow: a survey,” IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp. 493–512, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. J. Lan, G. Xiong, Y. Hu et al., “Research on the architecture of reconfigurable fundamental information communication network,” Telecommunications Science, vol. 31, no. 4, 2015. View at Google Scholar
  6. E. Deering S, Multicast Routing in Internetworks and Extended LANs, ACM, 1988.
  7. S. Keshav and S. Paul, “Centralized multicast,” in Proceedings of the 20th IEEE International Conference on Network Protocols (ICNP '12), p. 59, IEEE Computer Society, 2012.
  8. R. Ahlswede, N. Cai, S. Y. R. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204–1216, 2000. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. S.-Y. R. Li, N. Cai, and R. W. Yeung, “On theory of linear network coding,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '05), pp. 273–277, Adelaide, Australia, September 2005. View at Publisher · View at Google Scholar · View at Scopus
  10. K. Han, T. Ho, R. Koetter, M. Médard, and F. Zhao, “On network coding for security,” in Proceedings of the Military Communications Conference (MILCOM '07), pp. 1–6, IEEE, Orlando, Fla, USA, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. T. Ho, M. Médard, J. Shi et al., “On randomized network coding,” in Proceedings of the Allerton Conference on Communication, 2003.
  12. S. Y. R. Li, R. W. Yeung, and N. Cai, “Linear network coding,” IEEE Transactions on Information Theory, vol. 49, no. 2, pp. 371–381, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. F. Zhao, T. Kalker, M. Médard, and K. J. Han, “Signatures for content distribution with network coding,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), pp. 556–560, Nice, France, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. D. Boneh, D. Freeman, J. Katz et al., “Signing a linear subspace: signature schemes for network coding,” in Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography (PKC '09), pp. 68–87, Springer, 2009.
  15. Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, “An efficient scheme for securing XOR network coding against pollution attacks,” in Proceedings of the IEEE INFOCOM, pp. 406–414, IEEE, Rio de Janeiro, Brazil, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Agrawal and D. Boneh, “Homomorphic MACs: MAC-based integrity for network coding,” in Applied Cryptography and Network Security, Lecture Notes in Computer Science, pp. 292–305, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  17. S. Agrawal, D. Boneh, X. Boyen, and D. M. Freeman, “Preventing pollution attacks in multi-source network coding,” in Public Key Cryptography—PKC 2010, vol. 6056 of Lecture Notes in Computer Science, pp. 161–176, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. J. Dong, R. Curtmola, and C. Nita-Rotaru, “Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks,” in Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec '09), pp. 111–122, ACM, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, “RIPPLE authentication for network coding,” in Proceedings of the IEEE INFOCOM, pp. 1–9, San Diego, Calif, USA, March 2010. View at Publisher · View at Google Scholar
  20. H. Krawczyk and R. Canetti, “The TESLA broadcast authentication protocol,” Rsa Cryptobytes, vol. 20, no. 2, article 2002, 2002. View at Google Scholar
  21. X. Wu, Y. Xu, C. Yuen, and L. Xiang, “A tag encoding scheme against pollution attack to linear network coding,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 33–42, 2014. View at Publisher · View at Google Scholar · View at Scopus
  22. U. C. Kozat, G. Liang, and K. Kokten, “On diagnosis of forwarding plane via static forwarding rules in Software Defined Networks,” in Proceedings of the 33rd IEEE Conference on Computer Communications (IEEE INFOCOM '14), pp. 1716–1724, IEEE, Toronto, Canada, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  23. R. Cohen, L. Lewin-Eytan, J. Naor S, and D. Raz, “On the effect of forwarding table size on SDN network utilization,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '14), pp. 1734–1742, IEEE, Toronto, Canada, April-May 2014. View at Publisher · View at Google Scholar
  24. D. Kreutz, F. M. V. Ramos, and P. Verissimo, “Towards secure and dependable software-defined networks,” in Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN '13), pp. 55–60, ACM, Hong Kong, August 2013. View at Publisher · View at Google Scholar · View at Scopus
  25. Z. Yan and C. Prehofer, “Autonomic trust management for a component-based software system,” IEEE Transactions on Dependable & Secure Computing, vol. 8, no. 6, pp. 810–823, 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. S. Yao, J. Chen, R. Du, L. Deng, and C. Wang, “A survey of security network coding toward various attacks,” in Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom '14), pp. 252–259, IEEE Computer Society, Beijing, China, September 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. S. Jaggi, P. Sanders, P. A. Chou et al., “Polynomial time algorithms for multicast network code construction,” IEEE Transactions on Information Theory, vol. 51, no. 6, pp. 1973–1982, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus