Securing network coding against pollution attacks based on space and time properties

被引:0
|
作者
He, Ming [1 ]
Wang, Hong [1 ]
Chen, Lin [1 ]
Gong, Zhenghu [1 ]
Dai, Fan [1 ]
Liu, Zhihong [1 ]
机构
[1] NUDT, Changsha, Hunan, Peoples R China
来源
PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012) | 2012年
关键词
network coding; pollution attack; security; space and time; collusion;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
By allowing the mixture of information at the source and intermediate nodes, network coding benefits network protocols with increased throughput and higher reliability. However, such mixture makes network coding systems suffering pollution attacks, in which malicious nodes inject corrupted packets into the information flow. Previous solutions are either computationally expensive or too ineffective to limit pollution attacks with arbitrary collusion among malicious nodes. In this paper, we propose an efficient authentication scheme, STNC, which allows intermediate nodes to efficiently detect corrupted packets by using space and time properties of network coding. Our work is an innovative space and time based solution to frustrate pollution attacks with arbitrary collusion among malicious nodes, and the security of STNC scheme relies on the asymmetry of time in packet verification. We also present security analysis and simulations of our scheme, and results demonstrate the practicality and efficiency of STNC scheme.
引用
收藏
页码:2086 / 2090
页数:5
相关论文
共 50 条
  • [31] Defense Against Machine Learning Based Attacks in Multi-UAV Networks: A Network Coding Based Approach
    Chen, Yu-Jia
    Chen, Xiao-Chun
    Pan, Miao
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (04): : 2562 - 2578
  • [32] P-Coding: Secure Network Coding against Eavesdropping Attacks
    Zhang, Peng
    Jiang, Yixin
    Lin, Chuang
    Fan, Yanfei
    Shen, Xuemin
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [33] An Efficient Edge-Based Authentication for Network Coding Against Entropy Attacks
    Iguchi, Ryo
    Manabe, Yoshifumi
    2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2014, : 133 - 139
  • [34] A Secure Network Coding System Against Wiretap Attacks
    Wang Xuebing
    Qin Na
    Liu Yantao
    2019 34RD YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2019, : 62 - 67
  • [35] QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks
    Khalid, Faiq
    Ali, Hassan
    Tariq, Hanunad
    Hanif, Muhammad Abdullah
    Rehman, Semeen
    Ahmed, Rehan
    Shafique, Muhammad
    2019 IEEE 25TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2019), 2019, : 182 - 187
  • [36] A Network Coding Against Wiretapping Attacks of the Physical Layer Security Based on LDPC Code
    Zheng, Yujie
    Fu, Jingqi
    INTELLIGENT COMPUTING AND INTERNET OF THINGS, PT II, 2018, 924 : 429 - 440
  • [37] Securing Distributed Network Digital Twin Systems Against Model Poisoning Attacks
    Zhang, Zifan
    Fang, Minghong
    Chen, Mingzhe
    Li, Gaolei
    Lin, Xi
    Liu, Yuchen
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (21): : 34312 - 34324
  • [38] Secret Error Control Codes Against Malicious Attacks in Random Multisource Network Coding
    Siguang Chen
    Meng Wu
    Weifeng Lu
    Wireless Personal Communications, 2013, 69 : 1847 - 1864
  • [39] Secret Error Control Codes Against Malicious Attacks in Random Multisource Network Coding
    Chen, Siguang
    Wu, Meng
    Lu, Weifeng
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1847 - 1864
  • [40] Pollution Attack Resistance Dissemination in VANETs Based on Network Coding
    Wu, Guowei
    Wang, Jie
    Wang, Yongchuan
    Yao, Lin
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 131 - 138