Securing network coding against pollution attacks based on space and time properties

被引:0
|
作者
He, Ming [1 ]
Wang, Hong [1 ]
Chen, Lin [1 ]
Gong, Zhenghu [1 ]
Dai, Fan [1 ]
Liu, Zhihong [1 ]
机构
[1] NUDT, Changsha, Hunan, Peoples R China
来源
PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012) | 2012年
关键词
network coding; pollution attack; security; space and time; collusion;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
By allowing the mixture of information at the source and intermediate nodes, network coding benefits network protocols with increased throughput and higher reliability. However, such mixture makes network coding systems suffering pollution attacks, in which malicious nodes inject corrupted packets into the information flow. Previous solutions are either computationally expensive or too ineffective to limit pollution attacks with arbitrary collusion among malicious nodes. In this paper, we propose an efficient authentication scheme, STNC, which allows intermediate nodes to efficiently detect corrupted packets by using space and time properties of network coding. Our work is an innovative space and time based solution to frustrate pollution attacks with arbitrary collusion among malicious nodes, and the security of STNC scheme relies on the asymmetry of time in packet verification. We also present security analysis and simulations of our scheme, and results demonstrate the practicality and efficiency of STNC scheme.
引用
收藏
页码:2086 / 2090
页数:5
相关论文
共 50 条
  • [21] Secure Network Coding Against Intra/Inter-Generation Pollution Attacks
    Liu Guangjun
    Wang Bin
    CHINA COMMUNICATIONS, 2013, 10 (08) : 100 - 110
  • [22] A Tag Encoding Scheme against Pollution Attack to Linear Network Coding
    Wu, Xiaohu
    Xu, Yinlong
    Yuen, Chau
    Xiang, Liping
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 33 - 42
  • [23] An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
    Alireza Esfahani
    Georgios Mantas
    Jonathan Rodriguez
    José Carlos Neves
    International Journal of Information Security, 2017, 16 : 627 - 639
  • [24] An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    Neves, Jose Carlos
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (06) : 627 - 639
  • [25] Flooding attacks against network coding and countermeasures
    Zhang Y.
    Znaidi W.
    Lauradoux C.
    Minier M.
    Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011, 2011, : 305 - 309
  • [26] Comment on "A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding"
    Chang, Jinyong
    Shao, Bilin
    Ji, Yanyan
    Bian, Genqing
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 31 (11) : 2618 - 2619
  • [27] A Deep Detection Scheme against Pollution Attacks in Wireless Inter-flow Network Coding
    Shang, Tao
    Huang, Fuhua
    Peng, Tianli
    Liu, Jianwei
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 102 - 106
  • [28] Byzantine Attacks against Network Coding in Peer to Peer Distributed Storage
    Lima, Luisa
    Barros, Joao
    Koetter, Ralf
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1164 - +
  • [29] Defense Against Machine Learning Based Attacks in Multi-UAV Networks: A Network Coding Based Approach
    Chen, Yu-Jia
    Chen, Xiao-Chun
    Pan, Miao
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (04): : 2562 - 2578
  • [30] P-Coding: Secure Network Coding against Eavesdropping Attacks
    Zhang, Peng
    Jiang, Yixin
    Lin, Chuang
    Fan, Yanfei
    Shen, Xuemin
    2010 PROCEEDINGS IEEE INFOCOM, 2010,