Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes

被引:22
作者
Buttyan, Levente [1 ]
Czap, Laszlo [1 ]
Vajda, Istvan [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Telecommun, Lab Cryptog & Syst Secur CrySys, H-1117 Budapest, Hungary
关键词
Network level security and protection; sensor networks; distributed data storage; network coding; pollution attack; integrity protection;
D O I
10.1109/TDSC.2010.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We address the problem of pollution attacks in coding-based distributed storage systems. In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original data upon retrieval. We propose algorithms to detect and recover from such attacks. In contrast to existing approaches to solve this problem, our approach is not based on adding cryptographic checksums or signatures to the encoded packets, and it does not introduce any additional redundancy to the system. The results of our analysis show that our proposed algorithms are suitable for practical systems, especially in wireless sensor networks.
引用
收藏
页码:824 / 838
页数:15
相关论文
共 33 条
  • [31] A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and Homomorphic Fingerprinting
    Zeng, Rongfei
    Jiang, Yixin
    Lin, Chuang
    Fan, Yanfei
    Shen, Xuemin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (10) : 1819 - 1830
  • [32] An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
    Alireza Esfahani
    Georgios Mantas
    Jonathan Rodriguez
    José Carlos Neves
    International Journal of Information Security, 2017, 16 : 627 - 639
  • [33] An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    Neves, Jose Carlos
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (06) : 627 - 639