Flooding attacks against network coding and countermeasures

被引:3
|
作者
Zhang Y. [1 ,2 ]
Znaidi W. [1 ]
Lauradoux C. [1 ]
Minier M. [1 ]
机构
[1] Université de Lyon, INRIA, CITI Laboratory
[2] Computer Science and Technology Department, East China Normal University
来源
Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011 | 2011年
关键词
Flooding attack; multipath acknowledgment; network coding;
D O I
10.1109/ICNSS.2011.6060020
中图分类号
学科分类号
摘要
Network coding has attracted the attention of many researchers in security and cryptography. While most of the works have been dedicated to the protection of messages carrying information, nothing has been done to protect the acknowledgment messages needed in network coding. These flooding attacks are critical in resource constraint networks such as wireless sensor networks. An adversary can easily create congestion in the network and exhaust all the resources available. The degradation of the QoS (delay, energy) goes beyond the capabilities of cryptographic solutions. We investigate the security capabilities of multipath acknowledgment. © 2011 IEEE.
引用
收藏
页码:305 / 309
页数:4
相关论文
共 50 条
  • [21] A Deep Detection Scheme against Pollution Attacks in Wireless Inter-flow Network Coding
    Shang, Tao
    Huang, Fuhua
    Peng, Tianli
    Liu, Jianwei
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 102 - 106
  • [22] An Efficient Short Null Keys Based Scheme for Securing Network Coding Against Pollution Attacks
    Wang, Junsheng
    Wang, Jin
    Zhu, Yanqin
    Jia, Chengjin
    FRONTIERS IN INTERNET TECHNOLOGIES, 2015, 502 : 16 - 31
  • [23] A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding
    Jiang, Yixin
    Fan, Yanfei
    Shen, Xuemin
    Lin, Chuang
    COMPUTER NETWORKS, 2009, 53 (18) : 3089 - 3101
  • [24] A Null Space-based MAC Scheme against Pollution Attacks to Random Linear Network Coding
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    Nascimento, Alberto
    Neves, Jose Carlos
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 1521 - 1526
  • [25] Securing network coding against pollution attacks in P2P converged ubiquitous networks
    He, Ming
    Gong, Zhenghu
    Chen, Lin
    Wang, Hong
    Dai, Fan
    Liu, Zhihong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) : 642 - 650
  • [26] Orthogonal Vector based Network Coding against Pollution Attacks in n-layer Combination Networks
    Dai, Bin
    Zhang, Shijun
    Qu, Yipeng
    Yang, Jun
    Wang, Furong
    2010 5TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2010,
  • [27] Securing network coding against pollution attacks in P2P converged ubiquitous networks
    Ming He
    Zhenghu Gong
    Lin Chen
    Hong Wang
    Fan Dai
    Zhihong Liu
    Peer-to-Peer Networking and Applications, 2015, 8 : 642 - 650
  • [28] A Survey of Security Network Coding toward Various Attacks
    Yao, Shixiong
    Chen, Jing
    Du, Ruiying
    Deng, Lan
    Wang, Chiheng
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 252 - 259
  • [29] Distributed Detection of Flooding and Gray Hole Attacks in Wireless Sensor Network
    Dharini, N.
    Balakrishnan, Ranjith
    Renold, A. Pravin
    2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, : 178 - 184
  • [30] Security concerns and countermeasures in network coding based communication systems: A survey
    Talooki, Vahid Nazari
    Bassoli, Riccardo
    Lucani, Daniel E.
    Rodriguez, Jonathan
    Fitzek, Frank H. P.
    Marques, Hugo
    Tafazolli, Rahim
    COMPUTER NETWORKS, 2015, 83 : 422 - 445