An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network

06/14/2018
by   Ngoc Hong Tran, et al.
0

Coding Opportunistically (COPE) is a simple but very effective data coding mechanism in the wireless network. However, COPE leaves risks for attackers easily getting the private information saved in the packets, when they move through the network to their destination nodes. Hence in our work, a lightweight cryptographic approach, namely SCOPE, is proposed to consolidate COPE against the honest-but-curious and malicious attacks. Honest-but-curious attack serves adversaries who accurately obey the protocol but try to learn as much private information as possible for their curiosity. Additionally, this kind of attack is not destructive consequently. However, it may leave the backdoor for the more dangerous attacks carrying catastrophes to the system. Malicious attack tries to learn not only the private information but also modifies the packet on harmful purposes. In our work, the SCOPE protocol is defensive to the both attacks. The private information in the COPE packet are encrypted by Elliptic Curve Cryptography (ECC), and an additional information is inserted into SCOPE packets served for the authentication process using the lightweight hash Elliptic Curve Digital Signature Algorithm (ECDSA). We then prove our new protocol is still guaranteed to be a secure method of data coding, and to be light to effectively operate in the peer-to-peer wireless network

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/24/2017

Simple Countermeasures to Mitigate the Effect of Pollution Attack in Network Coding Based Peer-to-Peer Live Streaming

Network coding based peer-to-peer streaming represents an effective solu...
research
09/23/2021

An Improved Authentication Key Exchange Protocol Based on ECDH for WSNs

Wide-spread use of wireless sensor networks (WSNs) that are consisted of...
research
11/24/2018

Biscotti: A Ledger for Private and Secure Peer-to-Peer Machine Learning

Centralized solutions for privacy-preserving multi-party ML are becoming...
research
05/29/2020

Datashare: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists

Investigative journalists collect large numbers of digital documents dur...
research
06/13/2023

Modification in Elliptic Curve Cryptography based Mutual authentication scheme for smart grid communication using biometric approach

Smart grid is a self-sufficient system. That tracks how the energy is us...
research
03/15/2019

AccFlow: Defending Against the Low-Rate TCP DoS Attack in Wireless Sensor Networks

Because of the open nature of the Wireless Sensor Networks (WSN), the De...

Please sign up or login with your details

Forgot password? Click here to reset