Securing network coding against pollution attacks based on space and time properties

被引:0
|
作者
He, Ming [1 ]
Wang, Hong [1 ]
Chen, Lin [1 ]
Gong, Zhenghu [1 ]
Dai, Fan [1 ]
Liu, Zhihong [1 ]
机构
[1] NUDT, Changsha, Hunan, Peoples R China
来源
PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012) | 2012年
关键词
network coding; pollution attack; security; space and time; collusion;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
By allowing the mixture of information at the source and intermediate nodes, network coding benefits network protocols with increased throughput and higher reliability. However, such mixture makes network coding systems suffering pollution attacks, in which malicious nodes inject corrupted packets into the information flow. Previous solutions are either computationally expensive or too ineffective to limit pollution attacks with arbitrary collusion among malicious nodes. In this paper, we propose an efficient authentication scheme, STNC, which allows intermediate nodes to efficiently detect corrupted packets by using space and time properties of network coding. Our work is an innovative space and time based solution to frustrate pollution attacks with arbitrary collusion among malicious nodes, and the security of STNC scheme relies on the asymmetry of time in packet verification. We also present security analysis and simulations of our scheme, and results demonstrate the practicality and efficiency of STNC scheme.
引用
收藏
页码:2086 / 2090
页数:5
相关论文
共 50 条
  • [1] Securing Coding-Based Cloud Storage Against Pollution Attacks
    Anglano, Cosimo
    Gaeta, Rossano
    Grangetto, Marco
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2017, 28 (05) : 1457 - 1469
  • [2] Securing Network Coding Architectures Against Pollution Attacks With Band Codes
    Fiandrotti, Attilio
    Gaeta, Rossano
    Grangetto, Marco
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) : 730 - 742
  • [3] Securing network coding against pollution attacks in P2P converged ubiquitous networks
    He, Ming
    Gong, Zhenghu
    Chen, Lin
    Wang, Hong
    Dai, Fan
    Liu, Zhihong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) : 642 - 650
  • [4] Securing network coding against pollution attacks in P2P converged ubiquitous networks
    Ming He
    Zhenghu Gong
    Lin Chen
    Hong Wang
    Fan Dai
    Zhihong Liu
    Peer-to-Peer Networking and Applications, 2015, 8 : 642 - 650
  • [5] An Efficient Short Null Keys Based Scheme for Securing Network Coding Against Pollution Attacks
    Wang, Junsheng
    Wang, Jin
    Zhu, Yanqin
    Jia, Chengjin
    FRONTIERS IN INTERNET TECHNOLOGIES, 2015, 502 : 16 - 31
  • [6] Reputation-based defense scheme against pollution attacks on network coding
    Wang T.
    Cai Y.
    Zhang Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (11): : 2491 - 2499
  • [7] A Null Space-based MAC Scheme against Pollution Attacks to Random Linear Network Coding
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    Nascimento, Alberto
    Neves, Jose Carlos
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 1521 - 1526
  • [8] Practical Defenses Against Pollution Attacks in Wireless Network Coding
    Dong, Jing
    Curtmola, Reza
    Nita-Rotaru, Cristina
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [9] SECURE NETWORK CODING BASED ON HOMOMORPUIC SIGNATURE AGAINST POLLUTION ATTACKS
    Cheng, Zhen
    Chi, Kaikai
    Tian, Xianzhong
    Li, Yanjun
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1092 - 1096
  • [10] An Authentication Code Against Pollution Attacks in Network Coding
    Oggier, Frederique
    Fathi, Hanane
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (06) : 1587 - 1596