SPAIS: A novel Self-checking Pollution Attackers Identification Scheme in network coding-based wireless mesh networks

被引:5
作者
Zhu, Donghai [1 ]
Yang, Xinyu [1 ]
Yu, Wei [2 ]
机构
[1] Xi An Jiao Tong Univ, Dept Comp Sci & Technol, Xian 710049, Peoples R China
[2] Towson Univ, Towson, MD 21252 USA
基金
美国国家科学基金会;
关键词
Network coding; Pollution attack; Wireless mesh network; Identification;
D O I
10.1016/j.comnet.2015.08.023
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Pollution attacks refer to ones where attackers modify and inject corrupted data packets into the wireless network with network coding to disrupt the decoding process. In the context of network coding, the epidemic effect of pollution attacks can degrade network throughput significantly because of the mixing nature of network coding. To address this issue, a number of schemes to identify malicious nodes have been developed in the past. Nonetheless, these schemes have their limitations and cannot effectively deal with pollution attacks. In this paper, we propose a novel light-weight Self-checking Pollution Attackers Identification Scheme (SPAIS), which can identify the pollution attackers effectively and efficiently. By making full use of the broadcast nature of wireless media and the insight that a well-behaved node can monitor its downstream neighboring nodes locally by cooperating with other nodes, SPAIS hierarchically organizes the network as levels such that the nodes in the same level can monitor their downstream level nodes cooperatively. Through the combination of theoretical analysis and extensive simulations, our experimental data demonstrates that SPAIS can more effectively identify pollution attackers with a lower cost in comparison with the existing candidate schemes. For example, even if the quality of network connections is not in good condition and the malicious nodes send only one corrupted packet, the pollution attackers can be identified with a high probability. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:376 / 389
页数:14
相关论文
共 26 条
  • [1] Homomorphic MACs: MAC-Based Integrity for Network Coding
    Agrawal, Shweta
    Boneh, Dan
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 292 - +
  • [2] Link-level measurements from an 802.11b mesh network
    Aguayo, D
    Bicket, J
    Biswas, S
    Judd, G
    Morris, R
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2004, 34 (04) : 121 - 131
  • [3] Network information flow
    Ahlswede, R
    Cai, N
    Li, SYR
    Yeung, RW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1204 - 1216
  • [4] A survey on wireless mesh networks
    Akyildiz, IF
    Wang, XD
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (09) : S23 - S30
  • [5] [Anonymous], P 2 ACM C WIR NETW S
  • [6] [Anonymous], P ALL C
  • [7] [Anonymous], 2011, MIRACL LIB
  • [8] Chachulski S., 2007, P ASS COMP MACH SPEC
  • [9] Secure network coding for wireless mesh networks: Threats, challenges, and directions
    Dong, Jing
    Curtmola, Reza
    Nita-Rotaru, Cristina
    [J]. COMPUTER COMMUNICATIONS, 2009, 32 (17) : 1790 - 1801
  • [10] Donghai Zhu, 2012, IEEE International Conference on Communications (ICC 2012), P830, DOI 10.1109/ICC.2012.6364300