Autosoft Journal

Online Manuscript Access


Group-based fast data packet attribute authentication in the reconfigurable networks


Authors



Abstract

The reconfigurable networks in the Chinese national basic research project- Flexible Architecture of Reconfigurable Infrastructure can adjust its own structure to provide better services for applications according to their transactional attributes and is compatible with today2019s networks. Data packet authentication is necessary to guarantee that precious resources in the reconfigurable networks couldn2019t be abused. In this paper, we propose a novel fast data packet authentication scheme for the reconfigurable networks based on the attribute based signature and RSA accumulator. In our scheme, packets are organized and authenticated in groups. Every group only needs one signature to guarantee the authenticity of the first packet, and other packets in the group can be verified using the membership witness of RSA accumulator embedded in the packet. The proposed scheme can greatly reduce the generation and verification time of the packet authentication information. Simulation results demonstrate the practicality and efficiency of the proposed scheme.


Keywords


Pages

Total Pages: 8
Pages: 535-542

DOI
10.1080/10798587.2016.1152776


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 22
Issue: 4
Year: 2016

Cite this document


References

Baa N. IEEE Communications Surveys and Tutorials

Banikazemi, Mohammad et al. "Meridian: An SDN Platform for Cloud Network Services." IEEE Communications Magazine 51.2 (2013): 120-127. Crossref. Web. https://doi.org/10.1109/MCOM.2013.6461196

Baric N. Advances in cryptology-EUROCRYPT 1997

Bellare, Mihir, Juan A. Garay, and Tal Rabin. "Fast Batch Verification for Modular Exponentiation and Digital Signatures." Advances in Cryptology — EUROCRYPT”98 (1998): 236-250. Crossref. Web. https://doi.org/10.1007/BFb0054130

Camenisch, Jan, and Anna Lysyanskaya. "Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials." Lecture Notes in Computer Science (2002): 61-76. Crossref. Web. https://doi.org/10.1007/3-540-45708-9_5

Camenisch, Jan, Markulf Kohlweiss, and Claudio Soriente. "An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials." Lecture Notes in Computer Science (2009): 481-500. Crossref. Web. https://doi.org/10.1007/978-3-642-00468-1_27

Carter I.L. Proceedings ACM Symposium on Theory of Computing

Chen H. Intelligent Automation and Soft Computing

Chen, Xiaofeng et al. "Secure Outsourced Attribute-Based Signatures." IEEE Transactions on Parallel and Distributed Systems 25.12 (2014): 3285-3294. Crossref. Web. https://doi.org/10.1109/TPDS.2013.2295809

Chen, Chin-Ling et al. "Designing A Healthcare Authorization Model Based On Cloud Authentication." Intelligent Automation & Soft Computing 20.3 (2014): 365-379. Crossref. Web. https://doi.org/10.1080/10798587.2014.888243

Cohen, Rami et al. "On the Effect of Forwarding Table Size on SDN Network Utilization." IEEE INFOCOM 2014 - IEEE Conference on Computer Communications (2014): n. pag. Crossref. Web. https://doi.org/10.1109/INFOCOM.2014.6848111

Feng, Yansheng, Hua Ma, and Xiaofeng Chen. "Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons." Intelligent Automation & Soft Computing 21.1 (2014): 51-63. Crossref. Web. https://doi.org/10.1080/10798587.2014.915109

Gudipati, Aditya et al. "SoftRAN." Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking - HotSDN ”13 (2013): n. pag. Crossref. Web. https://doi.org/10.1145/2491185.2491207

Gui J.J. Intelligent Automation and Soft Computing

Hakuta, Keisuke et al. "Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures." Information Security and Cryptology - ICISC 2012 (2013): 425-440. Crossref. Web. https://doi.org/10.1007/978-3-642-37682-5_30

Jan C. Journal of Cryptology

Jiang, Yi, Jianping Li, and Anping Xiong. "Identity Based On-Line/Off-Line Signature With Designated Verifier." Intelligent Automation & Soft Computing 21.3 (2015): 433-443. Crossref. Web. https://doi.org/10.1080/10798587.2015.1015777

Joseph A.A. Proceedings of 19th ACM Conference on Computer and Communications Security

El Kaafarani, Ali, Essam Ghadafi, and Dalia Khader. "Decentralized Traceable Attribute-Based Signatures." Lecture Notes in Computer Science (2014): 327-348. Crossref. Web. https://doi.org/10.1007/978-3-319-04852-9_17

Kozat, Ulasc C., Guanfeng Liang, and Koray Kokten. "On Diagnosis of Forwarding Plane via Static Forwarding Rules in Software Defined Networks." IEEE INFOCOM 2014 - IEEE Conference on Computer Communications (2014): n. pag. Crossref. Web. https://doi.org/10.1109/INFOCOM.2014.6848109

Kreutz, Diego, Fernando M.V. Ramos, and Paulo Verissimo. "Towards Secure and Dependable Software-Defined Networks." Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking - HotSDN ”13 (2013): n. pag. Crossref. Web. https://doi.org/10.1145/2491185.2491199

Lara A. IEEE Communications Surveys and Tutorials

Law, Laurie, and Brian J. Matt. "Finding Invalid Signatures in Pairing-Based Batches." Lecture Notes in Computer Science 34-53. Crossref. Web. https://doi.org/10.1007/978-3-540-77272-9_3

Lin, Pingping et al. "Seamless Interworking of SDN and IP." Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM - SIGCOMM ”13 (2013): n. pag. Crossref. Web. https://doi.org/10.1145/2486001.2491703

Liu, Hongqiang Harry et al. "zUpdate." Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM - SIGCOMM ”13 (2013): n. pag. Crossref. Web. https://doi.org/10.1145/2486001.2486005

Lv, Xin, Feng Xu, and Serge G. Petiton. "Cryptographic Cloud Storage with Public Verifiability: Ensuring Data Security of the YML Framework." Intelligent Automation & Soft Computing 19.2 (2013): 111-121. Crossref. Web. https://doi.org/10.1080/10798587.2013.786958

Maji, Hemanta K., Manoj Prabhakaran, and Mike Rosulek. "Attribute-Based Signatures." Lecture Notes in Computer Science (2011): 376-392. Crossref. Web. https://doi.org/10.1007/978-3-642-19074-2_24

Malina, Lukas et al. "Short-Term Linkable Group Signatures with Categorized Batch Verification." Lecture Notes in Computer Science (2013): 244-260. Crossref. Web. https://doi.org/10.1007/978-3-642-37119-6_16

Matt, Brian J. "Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches." Pairing-Based Cryptography - Pairing 2010 (2010): 78-95. Crossref. Web. https://doi.org/10.1007/978-3-642-17455-1_6

McKeown, Nick et al. "OpenFlow." ACM SIGCOMM Computer Communication Review 38.2 (2008): 69. Crossref. Web. https://doi.org/10.1145/1355734.1355746

Perrig A. Proceedings of the Network and Distributed System Security Symposium (NDSS)

Shen, Wuyao et al. "The Research of A New Streaming Media Network Architecture Based on the Fusion of P2P And CDN." Intelligent Automation & Soft Computing 17.8 (2011): 1153-1165. Crossref. Web. https://doi.org/10.1080/10798587.2011.10643218

Tsz H.Y. Proceedings of the Conference on Information and Communications Security https://doi.org/10.1007/978-3-642-34129-8_15

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present




CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/