An efficient ECC-based mechanism for securing network coding-based P2P content distribution

被引:6
作者
He, Heng [1 ]
Li, Ruixuan [1 ]
Xu, Zhiyong [2 ]
Xiao, Weijun [3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Suffolk Univ, Dept Math & Comp Sci, Boston, TX USA
[3] Virginia Commonwealth Univ, Dept Elect & Comp Engn, Richmond, VA USA
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Peer-to-peer; Network coding; Content distribution; Pollution attack; Attacker identification; Elliptic curve cryptography;
D O I
10.1007/s12083-013-0239-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding has been demonstrated to be able to improve the performance of P2P content distribution. However, it is vulnerable to pollution attacks where malicious peers can flood the network with corrupted blocks easily, leading to substantial performance degradation. Moreover, existing corruption detection schemes for network coding are not well suited to P2P systems. Effective scheme to detect the corruption and identify the attacker is required to thwart such attacks. In this paper, we propose an efficient ECC-based mechanism for securing network coding-based P2P content distribution, namely ESNC, which includes an efficient network coding signature scheme and an identity-based malicious peer identification scheme. The two schemes cooperate to thwart pollution attacks on network coding effectively in P2P networks, not only detecting corrupted blocks on-the-fly efficiently, but also precisely identifying all the malicious peers quickly. ESNC is mainly based on elliptic curve cryptography (ECC) and can provide high level of security. It incurs significantly less computation and communication overheads than other comparable state-of-the-art schemes for P2P systems. ESNC can work with arbitrary topologies, as it is the case in P2P networks. Security analysis demonstrates that ESNC can resist hash collision attacks, signature forgery attacks, and collusion attacks with arbitrary number of colluding malicious peers. Simulation results show that ESNC effectively limits the corruption spread and identifies all the malicious peers in a short time under different practical settings.
引用
收藏
页码:572 / 589
页数:18
相关论文
共 50 条
  • [41] ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet
    Adhikari, Sharmistha
    Ray, Sangram
    Obaidat, Mohammad S. S.
    Biswas, G. P.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (01) : 571 - 607
  • [42] The Application of Network Coding in P2P Streammeida Technology
    Li, Ping
    CONFERENCE ON WEB BASED BUSINESS MANAGEMENT, VOLS 1-2, 2010, : 1213 - 1216
  • [43] A trust model of P2P network based on domain
    Xu, Fen
    Guo, Yajun
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 449 - 452
  • [44] Direction Based Content Search in Distributed P2P Networks
    Potdukhe, S. D.
    Phalke, D. A.
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 523 - 527
  • [45] Implementation and Simulation of Content Distribution Strategy in P2P VOD System
    Zhang, Jing
    2011 3RD INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND INFORMATION APPLICATION TECHNOLOGY ESIAT 2011, VOL 10, PT B, 2011, 10 : 1315 - 1320
  • [46] Ftree-CDN: Hybrid CDN and P2P architecture for efficient content distribution
    Abdallah, Hana Ben Hadj
    Louati, Wassef
    2019 27TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP), 2019, : 438 - 445
  • [47] A P2P Network for Multimedia Content Sharing Using Android-Based Mobile Devices
    Teixeira, Mario M.
    Machado, Felipe A. O.
    Pinto, Adriano, V
    COMMUNICATION IN CRITICAL EMBEDDED SYSTEMS, WOCCES 2016, 2017, 702 : 101 - 116
  • [48] The impact of content distribution on structured P2P networks in mobile scenarios
    Zöls, S
    Schollmeier, R
    Hofstätter, Q
    Tarlano, A
    Kellerer, W
    EUNICE 2005: NETWORKS AND APPLICATIONS TOWARDS A UBIQUITOUSLY CONNECTED WORLD, 2006, 196 : 219 - +
  • [49] A New Content Distribution Model with Path Probing Mechanism for P2P Overlay Networks
    Feily, Maryam
    Shahrestani, Alireza
    Saleh, Salah Noori
    Meulenberg, Andrew
    2012 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATION TECHNOLOGIES (ISTT), 2012, : 319 - 324
  • [50] Design choices for content distribution in P2P networks
    Al Hamra, A
    Felber, PA
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2005, 35 (05) : 29 - +