Flooding attacks against network coding and countermeasures

被引:3
|
作者
Zhang Y. [1 ,2 ]
Znaidi W. [1 ]
Lauradoux C. [1 ]
Minier M. [1 ]
机构
[1] Université de Lyon, INRIA, CITI Laboratory
[2] Computer Science and Technology Department, East China Normal University
来源
Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011 | 2011年
关键词
Flooding attack; multipath acknowledgment; network coding;
D O I
10.1109/ICNSS.2011.6060020
中图分类号
学科分类号
摘要
Network coding has attracted the attention of many researchers in security and cryptography. While most of the works have been dedicated to the protection of messages carrying information, nothing has been done to protect the acknowledgment messages needed in network coding. These flooding attacks are critical in resource constraint networks such as wireless sensor networks. An adversary can easily create congestion in the network and exhaust all the resources available. The degradation of the QoS (delay, energy) goes beyond the capabilities of cryptographic solutions. We investigate the security capabilities of multipath acknowledgment. © 2011 IEEE.
引用
收藏
页码:305 / 309
页数:4
相关论文
共 50 条
  • [1] P-Coding: Secure Network Coding against Eavesdropping Attacks
    Zhang, Peng
    Jiang, Yixin
    Lin, Chuang
    Fan, Yanfei
    Shen, Xuemin
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [2] An Authentication Code Against Pollution Attacks in Network Coding
    Oggier, Frederique
    Fathi, Hanane
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (06) : 1587 - 1596
  • [3] A Secure Network Coding System Against Wiretap Attacks
    Wang Xuebing
    Qin Na
    Liu Yantao
    2019 34RD YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2019, : 62 - 67
  • [4] Practical Defenses Against Pollution Attacks in Wireless Network Coding
    Dong, Jing
    Curtmola, Reza
    Nita-Rotaru, Cristina
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [5] Byzantine Attacks against Network Coding in Peer to Peer Distributed Storage
    Lima, Luisa
    Barros, Joao
    Koetter, Ralf
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1164 - +
  • [6] SECURE NETWORK CODING BASED ON HOMOMORPUIC SIGNATURE AGAINST POLLUTION ATTACKS
    Cheng, Zhen
    Chi, Kaikai
    Tian, Xianzhong
    Li, Yanjun
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1092 - 1096
  • [7] Securing Network Coding Architectures Against Pollution Attacks With Band Codes
    Fiandrotti, Attilio
    Gaeta, Rossano
    Grangetto, Marco
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) : 730 - 742
  • [8] On the Practicality of Cryptographic Defences Against Pollution Attacks in Wireless Network Coding
    Newell, Andrew
    Dong, Jing
    Nita-Rotaru, Cristina
    ACM COMPUTING SURVEYS, 2013, 45 (03)
  • [9] Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac
    Le, Anh
    Markopoulou, Athina
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (02) : 442 - 449
  • [10] Secure Network Coding Against Intra/Inter-Generation Pollution Attacks
    Liu Guangjun
    Wang Bin
    CHINA COMMUNICATIONS, 2013, 10 (08) : 100 - 110