Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes

被引:22
作者
Buttyan, Levente [1 ]
Czap, Laszlo [1 ]
Vajda, Istvan [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Telecommun, Lab Cryptog & Syst Secur CrySys, H-1117 Budapest, Hungary
关键词
Network level security and protection; sensor networks; distributed data storage; network coding; pollution attack; integrity protection;
D O I
10.1109/TDSC.2010.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We address the problem of pollution attacks in coding-based distributed storage systems. In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original data upon retrieval. We propose algorithms to detect and recover from such attacks. In contrast to existing approaches to solve this problem, our approach is not based on adding cryptographic checksums or signatures to the encoded packets, and it does not introduce any additional redundancy to the system. The results of our analysis show that our proposed algorithms are suitable for practical systems, especially in wireless sensor networks.
引用
收藏
页码:824 / 838
页数:15
相关论文
共 18 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]  
[Anonymous], 2004, P 2004 IEEE INT S IN
[3]  
[Anonymous], P IEEE INFOCOM
[4]  
BUTTYAN L, 2008, P IEEE WORKSH WIR SE
[5]  
DIMAKIS AG, 2006, P IEEE C AC SPEECH S
[6]  
DIMAKIS AG, 2005, P 4 INT S INF PROC S
[7]  
DIMAKIS AG, 2006, IEEE ACM T NETWORK, V14, P2809
[8]  
DIMAKIS AG, 2004, P AS C SIGN SYST COM
[9]  
Fan JL, 2007, ADV INTEL SYS RES, pU1
[10]   Network coding: An instant primer [J].
Fragouli, C ;
Le Boudec, JY ;
Widmer, J .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (01) :63-68