Securing network coding against pollution attacks based on space and time properties

被引:0
|
作者
He, Ming [1 ]
Wang, Hong [1 ]
Chen, Lin [1 ]
Gong, Zhenghu [1 ]
Dai, Fan [1 ]
Liu, Zhihong [1 ]
机构
[1] NUDT, Changsha, Hunan, Peoples R China
来源
PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012) | 2012年
关键词
network coding; pollution attack; security; space and time; collusion;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
By allowing the mixture of information at the source and intermediate nodes, network coding benefits network protocols with increased throughput and higher reliability. However, such mixture makes network coding systems suffering pollution attacks, in which malicious nodes inject corrupted packets into the information flow. Previous solutions are either computationally expensive or too ineffective to limit pollution attacks with arbitrary collusion among malicious nodes. In this paper, we propose an efficient authentication scheme, STNC, which allows intermediate nodes to efficiently detect corrupted packets by using space and time properties of network coding. Our work is an innovative space and time based solution to frustrate pollution attacks with arbitrary collusion among malicious nodes, and the security of STNC scheme relies on the asymmetry of time in packet verification. We also present security analysis and simulations of our scheme, and results demonstrate the practicality and efficiency of STNC scheme.
引用
收藏
页码:2086 / 2090
页数:5
相关论文
共 50 条
  • [11] On the Practicality of Cryptographic Defences Against Pollution Attacks in Wireless Network Coding
    Newell, Andrew
    Dong, Jing
    Nita-Rotaru, Cristina
    ACM COMPUTING SURVEYS, 2013, 45 (03)
  • [12] Homomorphic MAC-Based Scheme against Pollution Attacks in Network Coding
    ZHANG Yujie
    CAI Ying
    LI Zhuo
    FAN Yanfang
    Wuhan University Journal of Natural Sciences, 2013, 18 (05) : 435 - 442
  • [13] Secret Error-Correcting Network Coding against Eavesdropping and Pollution Attacks
    Chen, Siguang
    Wu, Meng
    Lu, Weifeng
    ADVANCED MATERIALS AND ENGINEERING MATERIALS, PTS 1 AND 2, 2012, 457-458 : 1499 - +
  • [14] Orthogonal Vector based Network Coding against Pollution Attacks in n-layer Combination Networks
    Dai, Bin
    Zhang, Shijun
    Qu, Yipeng
    Yang, Jun
    Wang, Furong
    2010 5TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2010,
  • [15] A novel approach for anti-pollution attacks in network coding
    Ning, Zuoting
    Shi, Weiqi
    Xiao, Lijun
    Liang, Wei
    Weng, Tien-Hsiung
    CONNECTION SCIENCE, 2021, 33 (03) : 447 - 462
  • [16] On Security Against Pollution Attacks in Network Coding Enabled 5G Networks
    Vasudevan, Vipindev Adat
    Tselios, Christos
    Politis, Ilias
    IEEE ACCESS, 2020, 8 : 38416 - 38437
  • [17] Efficient Codeguard Mechanism Against Pollution Attacks in Interflow Network Coding
    Krithiga, J.
    Porselvi, R. C.
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [18] Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac
    Le, Anh
    Markopoulou, Athina
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (02) : 442 - 449
  • [19] Efficient Schemes for Securing Network Coding Against Wiretapping
    LIU Guangjun
    ZHOU Hang
    WuhanUniversityJournalofNaturalSciences, 2013, 18 (04) : 355 - 362
  • [20] A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems
    Tong, Wei
    Zhong, Sheng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2255 - 2267