Flooding attacks against network coding and countermeasures

被引:3
|
作者
Zhang Y. [1 ,2 ]
Znaidi W. [1 ]
Lauradoux C. [1 ]
Minier M. [1 ]
机构
[1] Université de Lyon, INRIA, CITI Laboratory
[2] Computer Science and Technology Department, East China Normal University
来源
Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011 | 2011年
关键词
Flooding attack; multipath acknowledgment; network coding;
D O I
10.1109/ICNSS.2011.6060020
中图分类号
学科分类号
摘要
Network coding has attracted the attention of many researchers in security and cryptography. While most of the works have been dedicated to the protection of messages carrying information, nothing has been done to protect the acknowledgment messages needed in network coding. These flooding attacks are critical in resource constraint networks such as wireless sensor networks. An adversary can easily create congestion in the network and exhaust all the resources available. The degradation of the QoS (delay, energy) goes beyond the capabilities of cryptographic solutions. We investigate the security capabilities of multipath acknowledgment. © 2011 IEEE.
引用
收藏
页码:305 / 309
页数:4
相关论文
共 50 条
  • [11] Securing network coding against pollution attacks based on space and time properties
    He, Ming
    Wang, Hong
    Chen, Lin
    Gong, Zhenghu
    Dai, Fan
    Liu, Zhihong
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 2086 - 2090
  • [12] An Efficient Edge-Based Authentication for Network Coding Against Entropy Attacks
    Iguchi, Ryo
    Manabe, Yoshifumi
    2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2014, : 133 - 139
  • [13] Homomorphic MAC-Based Scheme against Pollution Attacks in Network Coding
    ZHANG Yujie
    CAI Ying
    LI Zhuo
    FAN Yanfang
    Wuhan University Journal of Natural Sciences, 2013, 18 (05) : 435 - 442
  • [14] Reputation-based defense scheme against pollution attacks on network coding
    Wang T.
    Cai Y.
    Zhang Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (11): : 2491 - 2499
  • [15] Secret Error-Correcting Network Coding against Eavesdropping and Pollution Attacks
    Chen, Siguang
    Wu, Meng
    Lu, Weifeng
    ADVANCED MATERIALS AND ENGINEERING MATERIALS, PTS 1 AND 2, 2012, 457-458 : 1499 - +
  • [16] On Security Against Pollution Attacks in Network Coding Enabled 5G Networks
    Vasudevan, Vipindev Adat
    Tselios, Christos
    Politis, Ilias
    IEEE ACCESS, 2020, 8 : 38416 - 38437
  • [17] Secret Error Control Codes Against Malicious Attacks in Random Multisource Network Coding
    Siguang Chen
    Meng Wu
    Weifeng Lu
    Wireless Personal Communications, 2013, 69 : 1847 - 1864
  • [18] Secret Error Control Codes Against Malicious Attacks in Random Multisource Network Coding
    Chen, Siguang
    Wu, Meng
    Lu, Weifeng
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1847 - 1864
  • [19] A Network Coding Against Wiretapping Attacks of the Physical Layer Security Based on LDPC Code
    Zheng, Yujie
    Fu, Jingqi
    INTELLIGENT COMPUTING AND INTERNET OF THINGS, PT II, 2018, 924 : 429 - 440
  • [20] An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
    Fan, Yanfei
    Jiang, Yixin
    Zhu, Haojin
    Shen, Xuemin
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2213 - 2221