Simulation Study of Routing Attacks Under Network Coding Environment

被引:0
作者
Cai, Ruo Jun [1 ]
Ali, G. G. Md. Nawaz [1 ]
Aung, Cherry Ye [1 ]
Zhao, Ming [1 ]
Chong, Peter Han Joo [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
来源
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2016年
关键词
network coding; attacks; wireless network routing;
D O I
10.1109/ICC.2016.7511292
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network coding has been introduced as a new paradigm for network routing protocols in recent years. The wide range of advantages of network coding, such as energy saving, throughput improvement and congestion mitigation, have been demonstrated in many practical systems. However, the nature of packet mixing, optimization of forwarding nodes selection cause the network coding based routing protocols vulnerable to routing attacks. In this paper, we conduct a detailed analysis of various security threats that attack on different components of intra-flow network coding based routing schemes, and provide an extensive simulation study of their impacts on the network performance. An adequate understanding of both threats and vulnerabilities of current network coding systems are essential to effectively design of defense mechanism. This paper is served as a preliminary guide in the effort of achieving security for network coding based wireless routing.
引用
收藏
页数:6
相关论文
共 18 条
  • [1] [Anonymous], P 2 ACM C WIR NETW S
  • [2] A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions
    Attar, Alireza
    Tang, Helen
    Vasilakos, Athanasios V.
    Yu, F. Richard
    Leung, Victor C. M.
    [J]. PROCEEDINGS OF THE IEEE, 2012, 100 (12) : 3172 - 3186
  • [3] Trading structure for randomness in wireless opportunistic routing
    Chachulski, Szymon
    Jennings, Michael
    Katti, Sachin
    Katabi, Dina
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) : 169 - 180
  • [4] DAS SR, 2000, P IEEE INFOCOM 2000
  • [5] Fall Kevin., 1999, NS NOTES DOCUMENTATI
  • [6] Fei Y., 2012, SELECTED AREAS COMMU, V30, P769
  • [7] Survey of network coding-aware routing protocols in wireless networks
    Iqbal, Muhammad Azhar
    Dai, Bin
    Huang, Benxiong
    Hassan, A.
    Yu, Shui
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (06) : 1956 - 1970
  • [8] Katti S., 2005, ALL ANN C COMM CONTR
  • [9] Detection of Malicious node Behaviour Via I-Watchdog Protocol in Mobile Ad hoc Network With DSDV Routing Scheme
    Lal, Nidhi
    Kumar, Shishupal
    Saxena, Aditya
    Chaurasiya, Vijay Km
    [J]. PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15), 2015, 49 : 264 - 273
  • [10] DCAR: Distributed Coding-Aware Routing in Wireless Networks
    Le, Jilin
    Lui, John C. S.
    Chiu, Dah-Ming
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (04) : 596 - 608