Pollution Attack Resistance Dissemination in VANETs Based on Network Coding

被引:1
作者
Wu, Guowei [1 ]
Wang, Jie [1 ]
Wang, Yongchuan [2 ]
Yao, Lin [1 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian 116621, Peoples R China
[2] Wuhan Econ & Technol Dev Zone, 531 Jiangcheng Ave, Wuhan 430056, Peoples R China
来源
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS | 2016年 / 83卷
关键词
VANET; dissemination; pollution attack; network coding;
D O I
10.1016/j.procs.2016.04.108
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Network coding is widely used in the dissemination schemes of VANETs, because it can improve the network throughput. However, it will bring the pollution attack into the network, making the decoding procedure error, so vehicles can not recover the original file. Therefore, we need adopt a signature scheme to validate a piece without decoding. In the current signing schemes, the linear subspace signature scheme is to defend the pollution attack. But the length of the signature equal to the piece size required several packets to be transmitted together. Moreover, even one lost packet or polluted packet may make the whole piece dropped including the unpolluted packets, causing the limited resources to be wasted. In this paper, we adopt the padding scheme, obtain a packet-size vector which is orthogonal to linear space spanned by all packets in a generation and sign the vector, reducing the length of the signature into packet size and more importantly validating coded packets other than coded pieces in a generation. The simulation shows that our scheme has higher downloading rate, and lower downloading delay. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:131 / 138
页数:8
相关论文
共 19 条
[1]   Homomorphic MACs: MAC-Based Integrity for Network Coding [J].
Agrawal, Shweta ;
Boneh, Dan .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 :292-+
[2]  
Ahmed S., 2006, PROC INT C WIRELESS, P527, DOI DOI 10.1145/1143549.1143654
[3]  
Charles Denis, 2009, International Journal of Information and Coding Theory, V1, P3, DOI 10.1504/IJICOT.2009.024044
[4]   A Novel Homomorphic MAC Scheme for Authentication in Network Coding [J].
Cheng, Chi ;
Jiang, Tao .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (11) :1228-1230
[5]  
Dai B., 2010, 2010 5 INT ICST C CO, P1
[6]   A random linear network coding approach to multicast [J].
Ho, Tracey ;
Medard, Muriel ;
Koetter, Ralf ;
Karger, David R. ;
Effros, Michelle ;
Shi, Jun ;
Leong, Ben .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (10) :4413-4430
[7]   Design of 5.9 GHz DSRC-based vehicular safety communication [J].
Jiang, Daniel ;
Taliwal, Viias ;
Meier, Andreas ;
Holfelder, Wieland ;
Herrtwich, Ralf .
IEEE WIRELESS COMMUNICATIONS, 2006, 13 (05) :36-43
[8]   Symbol-level network coding for wireless mesh networks [J].
Katti, Sachin ;
Katabi, Dina ;
Balakrishnan, Hari ;
Medard, Muriel .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (04) :401-412
[9]   Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding [J].
Kehdi, Elias ;
Li, Baochun .
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, :1224-1232
[10]  
Krithiga J., 2014, 2014 International Conference on Communications and Signal Processing (ICCSP), P1384, DOI 10.1109/ICCSP.2014.6950076