An efficient ECC-based mechanism for securing network coding-based P2P content distribution

被引:6
作者
He, Heng [1 ]
Li, Ruixuan [1 ]
Xu, Zhiyong [2 ]
Xiao, Weijun [3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Suffolk Univ, Dept Math & Comp Sci, Boston, TX USA
[3] Virginia Commonwealth Univ, Dept Elect & Comp Engn, Richmond, VA USA
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Peer-to-peer; Network coding; Content distribution; Pollution attack; Attacker identification; Elliptic curve cryptography;
D O I
10.1007/s12083-013-0239-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding has been demonstrated to be able to improve the performance of P2P content distribution. However, it is vulnerable to pollution attacks where malicious peers can flood the network with corrupted blocks easily, leading to substantial performance degradation. Moreover, existing corruption detection schemes for network coding are not well suited to P2P systems. Effective scheme to detect the corruption and identify the attacker is required to thwart such attacks. In this paper, we propose an efficient ECC-based mechanism for securing network coding-based P2P content distribution, namely ESNC, which includes an efficient network coding signature scheme and an identity-based malicious peer identification scheme. The two schemes cooperate to thwart pollution attacks on network coding effectively in P2P networks, not only detecting corrupted blocks on-the-fly efficiently, but also precisely identifying all the malicious peers quickly. ESNC is mainly based on elliptic curve cryptography (ECC) and can provide high level of security. It incurs significantly less computation and communication overheads than other comparable state-of-the-art schemes for P2P systems. ESNC can work with arbitrary topologies, as it is the case in P2P networks. Security analysis demonstrates that ESNC can resist hash collision attacks, signature forgery attacks, and collusion attacks with arbitrary number of colluding malicious peers. Simulation results show that ESNC effectively limits the corruption spread and identifies all the malicious peers in a short time under different practical settings.
引用
收藏
页码:572 / 589
页数:18
相关论文
共 50 条
  • [31] A proposal of user authentication and a content distribution mechanism using P2P connection over a mobile ad hoc network
    Oguchi, M
    Nakatsuka, Y
    Tomizawa, C
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE COMMUNICATION SYSTEMS AND NETWORKS, 2004, : 65 - 69
  • [32] TOWARDS A P2P VIDEOCONFERENCING SYSTEM BASED ON LOW-DELAY NETWORK CODING
    Fiandrotti, Attilio
    Sheikh, Anooq Muzaffar
    Magli, Enrico
    2012 PROCEEDINGS OF THE 20TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2012, : 1529 - 1533
  • [33] Network coding-based multisource content delivery in Content Centric Networking
    Liu, Yan
    Yu, Shun-Zheng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 64 : 167 - 175
  • [34] Topological influence on optimality of Tit-for-Tat based P2P content distribution
    Masahiro Sasabe
    Peer-to-Peer Networking and Applications, 2020, 13 : 243 - 254
  • [36] Developing an extensible framework for content based searching in super peer p2p network
    Islam, Muhammad Nazrul
    Islam, Md. Ashiqul
    Shadaque, Imani Jafar
    Khan, Md. Razib Hayat
    PROCEEDINGS OF 10TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT 2007), 2007, : 141 - 145
  • [37] Contracting Models for P2P Content Distribution
    Ghasemkhani, Hossein
    Li, Yung-Ming
    Moinzadeh, Kamran
    Tan, Yong
    PRODUCTION AND OPERATIONS MANAGEMENT, 2018, 27 (11) : 1940 - 1959
  • [38] ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet
    Sharmistha Adhikari
    Sangram Ray
    Mohammad S. Obaidat
    G. P. Biswas
    Wireless Personal Communications, 2023, 132 : 571 - 607
  • [39] ECSP: An efficient cluster based P2P architecture
    Vuong, ST
    Li, J
    IC'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2003, : 860 - 865
  • [40] Network Coding Based Multiple Fault Tolerance Scheme in P2P Cloud Storage System
    Arya, Neha
    Rout, Rashmi Ranjan
    Lingam, Greeshma
    2018 IEEE 13TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (IEEE ICIIS), 2018, : 230 - 235