Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes

被引:22
作者
Buttyan, Levente [1 ]
Czap, Laszlo [1 ]
Vajda, Istvan [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Telecommun, Lab Cryptog & Syst Secur CrySys, H-1117 Budapest, Hungary
关键词
Network level security and protection; sensor networks; distributed data storage; network coding; pollution attack; integrity protection;
D O I
10.1109/TDSC.2010.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We address the problem of pollution attacks in coding-based distributed storage systems. In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original data upon retrieval. We propose algorithms to detect and recover from such attacks. In contrast to existing approaches to solve this problem, our approach is not based on adding cryptographic checksums or signatures to the encoded packets, and it does not introduce any additional redundancy to the system. The results of our analysis show that our proposed algorithms are suitable for practical systems, especially in wireless sensor networks.
引用
收藏
页码:824 / 838
页数:15
相关论文
共 33 条
  • [21] On the network coding-based D2D collaborative recovery scheme for scalable video broadcasting
    Wang, Lei
    Sun, Jie
    Chen, Liang
    Yin, Jun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 239
  • [22] A Deep Detection Scheme against Pollution Attacks in Wireless Inter-flow Network Coding
    Shang, Tao
    Huang, Fuhua
    Peng, Tianli
    Liu, Jianwei
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 102 - 106
  • [23] Probability-Symmetric Storage Allocation for Distributed Storage Systems based on Network Coding
    Wu, Qingtao
    Zhang, Xulong
    Zheng, Ruijuan
    Zhang, Mingchuan
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2013, 9 (SPL.ISSUE4) : 64 - 68
  • [24] On the Network Coding-Based D2D Cooperative Recovery for Lossy Feedback-Free Broadcasting
    Yin, Jun
    Chen, Liang
    Zhu, Ming
    Zhang, Zhaowei
    Yang, Yuwang
    Zhang, Dengyin
    IEEE COMMUNICATIONS LETTERS, 2023, 27 (09) : 2283 - 2287
  • [25] An Efficient Short Null Keys Based Scheme for Securing Network Coding Against Pollution Attacks
    Wang, Junsheng
    Wang, Jin
    Zhu, Yanqin
    Jia, Chengjin
    FRONTIERS IN INTERNET TECHNOLOGIES, 2015, 502 : 16 - 31
  • [26] A Null Space-based MAC Scheme against Pollution Attacks to Random Linear Network Coding
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    Nascimento, Alberto
    Neves, Jose Carlos
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 1521 - 1526
  • [27] Energy-Efficient Distributed Data Storage for Wireless Sensor Networks Based on Compressed Sensing and Network Coding
    Yang, Xianjun
    Tao, Xiaofeng
    Dutkiewicz, Eryk
    Huang, Xiaojing
    Guo, Y. Jay
    Cui, Qimei
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (10) : 5087 - 5099
  • [28] Distributed multi-objective cross-layer optimization with joint hyperlink and transmission mode scheduling in network coding-based wireless networks
    Liu, Jain-Shing
    Tsai, Jichiang
    AD HOC NETWORKS, 2016, 37 : 460 - 474
  • [29] On Ordered Transmission Based Distributed Gaussian Shift-in-Mean Detection Under Byzantine Attacks
    Quan, Chen
    Bulusu, Saikiran
    Geng, Baocheng
    Han, Yunghsiang S.
    Sriranga, Nandan
    Varshney, Pramod K.
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2023, 71 : 3343 - 3356
  • [30] Distributed Krein space-based attack detection over sensor networks under deception attacks
    Ge, Xiaohua
    Han, Qing-Long
    Zhong, Maiying
    Zhang, Xian-Ming
    AUTOMATICA, 2019, 109