On the Practicality of Cryptographic Defences Against Pollution Attacks in Wireless Network Coding

被引:8
作者
Newell, Andrew [1 ]
Dong, Jing [1 ]
Nita-Rotaru, Cristina [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
Experimentation; Performance; Security; Network coding; pollution attacks; wireless mesh networks;
D O I
10.1145/2480741.2480756
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Numerous practical systems based on network coding have been proposed in recent years demonstrating the wide range of benefits of network coding, such as increased throughput, reliability, and energy efficiency. However, network coding systems are inherently vulnerable to a severe attack, known as packet pollution, which presents a key obstacle to the deployment of such systems. Several cryptographic schemes have been proposed to defend against pollution attacks. We conduct a detailed analysis and an experimental evaluation in a realistic wireless network coding setting of a set of representative cryptographic defenses against pollution attacks. Our analysis identifies severe limitations of asymmetric-based schemes, which impose high communication overhead by placing constraints on the basic network coding parameters and high computation overhead by relying on numerous operations over large fields. Our analysis also shows that symmetric cryptographic schemes, while having better performance than asymmetric cryptographic-based schemes, impose prohibitive overhead in the presence of multiple byzantine adversaries. We further evaluate these schemes by using a set of typical network coding system parameters on a realistic topology. Our experimental evaluation shows that all the schemes we compare induce a throughput degradation that negates the performance benefits of network coding in the presence of multiple colluding adversaries.
引用
收藏
页数:26
相关论文
共 42 条
  • [1] Agrawal S., 2009, P INT C APPL CRYPT N
  • [2] Ahlswede R., 2000, IEEE T INFORM THEORY
  • [3] AJTAI M, 1996, P ACM S THEOR COMP
  • [4] [Anonymous], P 40 ANN C INF SCI S
  • [5] [Anonymous], P IEEE INT S INF THE
  • [6] [Anonymous], P IEEE INT C NETW PR
  • [7] BONEH D, 2010, HOMOMORPHIC SIGNATUR
  • [8] Boneh D., 2009, P INT C PRACT THEOR
  • [9] CAI N., 2006, COMMUN INFORM SYST, V6
  • [10] CHACHULSKI S., 2007, P ACM SIGCOMM C