Securing network coding against pollution attacks based on space and time properties

被引:0
作者
He, Ming [1 ]
Wang, Hong [1 ]
Chen, Lin [1 ]
Gong, Zhenghu [1 ]
Dai, Fan [1 ]
Liu, Zhihong [1 ]
机构
[1] NUDT, Changsha, Hunan, Peoples R China
来源
PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012) | 2012年
关键词
network coding; pollution attack; security; space and time; collusion;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
By allowing the mixture of information at the source and intermediate nodes, network coding benefits network protocols with increased throughput and higher reliability. However, such mixture makes network coding systems suffering pollution attacks, in which malicious nodes inject corrupted packets into the information flow. Previous solutions are either computationally expensive or too ineffective to limit pollution attacks with arbitrary collusion among malicious nodes. In this paper, we propose an efficient authentication scheme, STNC, which allows intermediate nodes to efficiently detect corrupted packets by using space and time properties of network coding. Our work is an innovative space and time based solution to frustrate pollution attacks with arbitrary collusion among malicious nodes, and the security of STNC scheme relies on the asymmetry of time in packet verification. We also present security analysis and simulations of our scheme, and results demonstrate the practicality and efficiency of STNC scheme.
引用
收藏
页码:2086 / 2090
页数:5
相关论文
共 50 条
  • [41] Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes
    Buttyan, Levente
    Czap, Laszlo
    Vajda, Istvan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) : 824 - 838
  • [42] Thwarting Pollution Attacks in Network Coding for Delay Tolerant Mobile Social Networks
    Sassatelli, Lucile
    Medard, Muriel
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [43] On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks
    Raja, K. Nirmal
    Beno, M. Marsaline
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
  • [44] On securing Wireless Sensor Network-Novel authentication scheme against DOS attacks
    K. Nirmal Raja
    M. Marsaline Beno
    Journal of Medical Systems, 2014, 38
  • [45] An Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (05) : 918 - 921
  • [46] Securing Ultrasonic Sensors Against signal Injection Attacks Based on a Mathematical Model
    Lee, Sunwoo
    Choi, Wonsuk
    Lee, Dong Hoon
    IEEE ACCESS, 2019, 7 : 107716 - 107729
  • [47] Securing designs against scan-based side-channel attacks
    Lee, Jeremy
    Tehranipoor, Mohammad
    Patel, Chintan
    Plusquellic, Jim
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 325 - 336
  • [48] Securing RPL-Based Networks Against Version Number and Rank Attacks
    Khalfoune, Alaa Eddine
    Beghdad, Rachid
    ACTA INFORMATICA PRAGENSIA, 2024, 13 (03) : 340 - 358
  • [49] How network coding system constrains packet pollution attacks in wireless sensor networks
    Zhang, Yuanyuan
    Minier, Marine
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 197 - 203
  • [50] PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis
    Finkenzeller, Andreas
    Butowski, Oliver
    Regnath, Emanuel
    Hamad, Mohammad
    Steinhorst, Sebastian
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 461 - 470