Flooding attacks against network coding and countermeasures

被引:3
|
作者
Zhang Y. [1 ,2 ]
Znaidi W. [1 ]
Lauradoux C. [1 ]
Minier M. [1 ]
机构
[1] Université de Lyon, INRIA, CITI Laboratory
[2] Computer Science and Technology Department, East China Normal University
来源
Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011 | 2011年
关键词
Flooding attack; multipath acknowledgment; network coding;
D O I
10.1109/ICNSS.2011.6060020
中图分类号
学科分类号
摘要
Network coding has attracted the attention of many researchers in security and cryptography. While most of the works have been dedicated to the protection of messages carrying information, nothing has been done to protect the acknowledgment messages needed in network coding. These flooding attacks are critical in resource constraint networks such as wireless sensor networks. An adversary can easily create congestion in the network and exhaust all the resources available. The degradation of the QoS (delay, energy) goes beyond the capabilities of cryptographic solutions. We investigate the security capabilities of multipath acknowledgment. © 2011 IEEE.
引用
收藏
页码:305 / 309
页数:4
相关论文
共 50 条
  • [41] Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
    Payam Mohammadi
    Ali Ghaffari
    Wireless Personal Communications, 2019, 106 : 365 - 376
  • [42] Energy-Based Detection of Multi-layer Flooding Attacks on Wireless Sensor Network
    Di Sarno, Cesario
    Garofalo, Alessia
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, 2014, 8696 : 339 - 349
  • [43] Efficient Schemes for Securing Network Coding Against Wiretapping
    LIU Guangjun
    ZHOU Hang
    WuhanUniversityJournalofNaturalSciences, 2013, 18 (04) : 355 - 362
  • [44] Strategies of network coding against nodes conspiracy attack
    Du, Rong
    Zhao, Chenglin
    Zhao, Feng
    Li, Shenghong
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (14) : 2396 - 2403
  • [45] A Lightweight Secure Network Coding Scheme against Wiretapping
    LIU Guangjun
    LIU Ximeng
    XIONG Jinbo
    ZHOU Hang
    WuhanUniversityJournalofNaturalSciences, 2014, 19 (02) : 156 - 160
  • [46] Secure Network Coding Against the Contamination and Eavesdropping Adversaries
    Zhou Yejun
    Li Hui
    Ma Jianfeng
    CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (03): : 411 - 416
  • [47] An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
    Alireza Esfahani
    Georgios Mantas
    Jonathan Rodriguez
    José Carlos Neves
    International Journal of Information Security, 2017, 16 : 627 - 639
  • [48] An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    Neves, Jose Carlos
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (06) : 627 - 639
  • [49] Thwarting Pollution Attacks in Network Coding for Delay Tolerant Mobile Social Networks
    Sassatelli, Lucile
    Medard, Muriel
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [50] RESEARCH ON DETECTING SIP MESSAGE FLOODING ATTACKS
    Sun, Qibo
    Qian, Shuang
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 278 - +