Securing Wireless Network Coding against Pollution Attack at the Physical Layer

被引:0
|
作者
Kim, Sang Wu [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
来源
2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012) | 2012年
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We take a physical layer perspective in detecting the falsely injected vector (pollution attack) and removing it from the polluted packet to restore the true coded packet in wireless network coding system. The proposed scheme builds on the maximum likelihood detection principle which is optimal in the sense of minimizing the probability of detection error. It discards only the faulty information and keeps the true coded packet, thereby making the retransmission of new coded packets unnecessary. This allows uninterrupted communication even under the attack. The proposed scheme is shown to provide a significant reliability gain over the cryptographic solution.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Cooperative quadrature physical layer network coding in wireless relay networks
    Yang, Hongjuan
    Chong, Peter H. J.
    Meng, Weixiao
    Li, Bo
    Guan, Yong Liang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (01) : 112 - 126
  • [32] On Capacity of Random Wireless Networks with Physical-Layer Network Coding
    Lu, Kejie
    Fu, Shengli
    Qian, Yi
    Chen, Hsiao-Hwa
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2009, 27 (05) : 763 - 772
  • [33] Node Localization in Wireless Networks Through Physical Layer Network Coding
    Li, Zhiwei
    Pu, Di
    Wang, Weichao
    Wyglinski, Alex
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [34] An Efficient Short Null Keys Based Scheme for Securing Network Coding Against Pollution Attacks
    Wang, Junsheng
    Wang, Jin
    Zhu, Yanqin
    Jia, Chengjin
    FRONTIERS IN INTERNET TECHNOLOGIES, 2015, 502 : 16 - 31
  • [35] Efficient Schemes for Securing Network Coding Against Wiretapping
    LIU Guangjun
    ZHOU Hang
    Wuhan University Journal of Natural Sciences, 2013, 18 (04) : 355 - 362
  • [36] Securing network coding against pollution attacks in P2P converged ubiquitous networks
    He, Ming
    Gong, Zhenghu
    Chen, Lin
    Wang, Hong
    Dai, Fan
    Liu, Zhihong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) : 642 - 650
  • [37] Rateless and Pollution-Attack-Resilient Network Coding
    Huang, Wentao
    Wang, Ting
    Hu, Xin
    Jang, Jiyong
    Salonidis, Theodoros
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 2623 - 2627
  • [38] Securing network coding against pollution attacks in P2P converged ubiquitous networks
    Ming He
    Zhenghu Gong
    Lin Chen
    Hong Wang
    Fan Dai
    Zhihong Liu
    Peer-to-Peer Networking and Applications, 2015, 8 : 642 - 650
  • [39] Securing Broadcast Authentication in Wireless Sensor Networks Against DoS Attack
    Alghamdi, Ahmed
    Arozullah, Mohammed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (04): : 8 - 18
  • [40] A Total Adaptive Power Allocation for Physical Layer Network Coding in Wireless Networks
    Huang, Yung-Fa
    Tan, Tan-Hsu
    Peng, Shi-Yan
    Cheng, Chia-Hsin
    2013 SEVENTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS (CISIS), 2013, : 320 - 324