Flooding attacks against network coding and countermeasures

被引:3
|
作者
Zhang Y. [1 ,2 ]
Znaidi W. [1 ]
Lauradoux C. [1 ]
Minier M. [1 ]
机构
[1] Université de Lyon, INRIA, CITI Laboratory
[2] Computer Science and Technology Department, East China Normal University
来源
Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011 | 2011年
关键词
Flooding attack; multipath acknowledgment; network coding;
D O I
10.1109/ICNSS.2011.6060020
中图分类号
学科分类号
摘要
Network coding has attracted the attention of many researchers in security and cryptography. While most of the works have been dedicated to the protection of messages carrying information, nothing has been done to protect the acknowledgment messages needed in network coding. These flooding attacks are critical in resource constraint networks such as wireless sensor networks. An adversary can easily create congestion in the network and exhaust all the resources available. The degradation of the QoS (delay, energy) goes beyond the capabilities of cryptographic solutions. We investigate the security capabilities of multipath acknowledgment. © 2011 IEEE.
引用
收藏
页码:305 / 309
页数:4
相关论文
共 50 条
  • [31] Defense Against Machine Learning Based Attacks in Multi-UAV Networks: A Network Coding Based Approach
    Chen, Yu-Jia
    Chen, Xiao-Chun
    Pan, Miao
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (04): : 2562 - 2578
  • [32] Flooding Attacks against Secure Time-Critical Communications in the Power Grid
    Zhang, Fengli
    Mahler, Michael
    Li, Qinghua
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2017, : 449 - 454
  • [33] Defending MANETs against Flooding Attacks for Military Applications under Group Mobility
    Kaur, Taranpreet
    Toor, Amanjot Singh
    Saluja, Krishan Kumar
    2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS), 2014,
  • [34] Simulation Study of Routing Attacks Under Network Coding Environment
    Cai, Ruo Jun
    Ali, G. G. Md. Nawaz
    Aung, Cherry Ye
    Zhao, Ming
    Chong, Peter Han Joo
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [35] A novel approach for anti-pollution attacks in network coding
    Ning, Zuoting
    Shi, Weiqi
    Xiao, Lijun
    Liang, Wei
    Weng, Tien-Hsiung
    CONNECTION SCIENCE, 2021, 33 (03) : 447 - 462
  • [36] A Semantic Rule-based Detection Scheme against Flooding Attacks on Cloud Environment
    Lin, Chu-Hsing
    Lee, Chen-Yu
    Lai, Shin-Pin
    Lai, Wei-Shen
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 341 - 346
  • [37] Traffic Shaping Impact of Network Coding on Spectrum Predictability and Jamming Attacks
    Wang, Shanshan
    Sagduyu, Yalin E.
    Zhang, Junshan
    Li, Jason Hongjun
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 293 - 298
  • [38] Protecting Delay-Sensitive Traffic Transmission against Flooding Attacks in Smart Grid Networks
    Kim, Mihui
    2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, 2013, : 1121 - 1124
  • [39] Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
    Mohammadi, Payam
    Ghaffari, Ali
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (02) : 365 - 376
  • [40] A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks
    Roh, Byeong-hee
    Kim, Ju Wan
    Ryu, Ki-Yeol
    Ryu, Jea-Tek
    COMPUTERS & SECURITY, 2013, 37 : 46 - 61