Simple Countermeasures to Mitigate the Effect of Pollution Attack in Network Coding-Based Peer-to-Peer Live Streaming

被引:16
作者
Fiandrotti, Attilio [1 ]
Gaeta, Rossano [2 ]
Grangetto, Marco [2 ]
机构
[1] Sisvel Technol, I-10060 None Torinese, Italy
[2] Univ Turin, Dept Comp Sci, I-10149 Turin, Italy
关键词
Continuity index; measurements; network coding; peer to peer (P2P); pollution attack; MALICIOUS NODES; CODES; IDENTIFICATION; SCHEME;
D O I
10.1109/TMM.2015.2402516
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding (NC)-based peer-to-peer (P2P) streaming represents an effective solution to aggregate user capacities and to increase system throughput in live multimedia streaming. Nonetheless, such systems are vulnerable to pollution attacks where a handful of malicious peers can disrupt the communication by transmitting just a few bogus packets which are then recombined and relayed by unaware honest nodes, further spreading the pollution over the network. Whereas previous research focused on malicious nodes identification schemes and pollution-resilient coding, in this paper we show pollution countermeasures which make a standard NC scheme resilient to pollution attacks. Thanks to a simple yet effective analytical model of a reference node collecting packets by malicious and honest neighbors, we demonstrate that: i) packets received earlier are less likely to be polluted, and ii) short generations increase the likelihood to recover a clean generation. Therefore, we propose a recombination scheme where nodes draw packets to be recombined according to their age in the input queue, paired with a decoding scheme able to detect the reception of polluted packets early in the decoding process and short generations. The effectiveness of our approach is experimentally evaluated in a real system we developed and deployed on hundreds to thousands of peers. Experimental evidence shows that, thanks to our simple countermeasures, the effect of a pollution attack is almost canceled and the video quality experienced by the peers is comparable to pre-attack levels.
引用
收藏
页码:562 / 573
页数:12
相关论文
共 25 条
[1]   On the Fly Gaussian Elimination for LT Codes [J].
Bioglio, Valerio ;
Grangetto, Marco ;
Gaeta, Rossano ;
Sereno, Matteo .
IEEE COMMUNICATIONS LETTERS, 2009, 13 (12) :953-955
[2]  
Charles D., 2006, Proceedings of the Conference in Information Sciences and Systems, V1, P3
[3]  
Dhungel P., 2007, P2P TV PROC WORKSHOP, P323
[4]   Band Codes for Energy-Efficient Network Coding With Application to P2P Mobile Streaming [J].
Fiandrotti, Attilio ;
Bioglio, Valerio ;
Grangetto, Marco ;
Gaeta, Rossano ;
Magli, Enrico .
IEEE TRANSACTIONS ON MULTIMEDIA, 2014, 16 (02) :521-532
[5]  
Fiandrotti A, 2012, EUR SIGNAL PR CONF, P1529
[6]   DIP: Distributed Identification of Polluters in P2P Live Streaming [J].
Gaeta, Rossano ;
Grangetto, Marco ;
Bovio, Lorenzo .
ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2014, 10 (03)
[7]   Identification of Malicious Nodes in Peer-to-Peer Streaming: A Belief Propagation-Based Technique [J].
Gaeta, Rossano ;
Grangetto, Marco .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (10) :1994-2003
[8]   Cooperative security for network coding file distribution [J].
Gkantsidis, Christos ;
Rodriguez, Pablo Rodriguez .
25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, :1749-1761
[9]   RATELESS CODES NETWORK CODING FOR SIMPLE AND EFFICIENT P2P VIDEO STREAMING [J].
Grangetto, Marco ;
Gaeta, Rossano ;
Sereno, Matteo .
ICME: 2009 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-3, 2009, :1500-1503
[10]   Byzantine modification detection in multicast networks with random network coding [J].
Ho, Tracey ;
Leong, Ben ;
Koetter, Ralf ;
Medard, Muriel ;
Effros, Michelle ;
Karger, David R. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2798-2803