Securing Network Coding Architectures Against Pollution Attacks With Band Codes

被引:9
作者
Fiandrotti, Attilio [1 ]
Gaeta, Rossano [2 ]
Grangetto, Marco [2 ]
机构
[1] Telecom ParisTech, Images Donnees Signals Dept, F-75013 Paris, France
[2] Univ Torino, Dipartimento Informat, I-10129 Turin, Italy
关键词
Network coding; pollution attacks; secure video communications; peer to peer; distributed scheme; LIVE STREAMING SYSTEMS; EFFICIENT; SCHEME;
D O I
10.1109/TIFS.2018.2859583
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
During a pollution attack, malicious nodes purposely transmit bogus data to the honest nodes to cripple the communication. Securing the communication requires identifying and isolating the malicious nodes. However, in network coding (NC) architectures, random recombinations at the nodes increase the probability that honest nodes relay polluted packets. Thus, discriminating between honest and malicious nodes to isolate the latter turns out to be challenging at best. Band codes (BCs) are a family of rateless codes whose coding window size can be adjusted to reduce the probability that honest nodes relay polluted packets. We leverage such a property to design a distributed scheme for identifying the malicious nodes in the network. Each node counts the number of times that each neighbor has been involved in cases of polluted data reception and exchanges such counts with its neighbor nodes. Then, each node computes for each neighbor a discriminative honest score estimating the probability that the neighbor relays clean packets. We model such probability as a function of the BC coding window size, showing its impact on the accuracy and effectiveness of our distributed blacklisting scheme. We experiment distributing a live video feed in a P2P NC system, verifying the accuracy of our model and showing that our scheme allows us to secure the network against pollution attacks recovering near pre-attack video quality.
引用
收藏
页码:730 / 742
页数:13
相关论文
共 29 条
  • [1] Network information flow
    Ahlswede, R
    Cai, N
    Li, SYR
    Yeung, RW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1204 - 1216
  • [2] [Anonymous], 2016, WHIT PAP CISC VNI FO
  • [3] [Anonymous], P IEEE INFOCOM
  • [4] [Anonymous], P 27 C COMP COMM INF
  • [5] [Anonymous], 2001, RANDOM GRAPHS
  • [6] Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding
    Cheng, Chi
    Lee, Jemin
    Jiang, Tao
    Takagi, Tsuyoshi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) : 993 - 1002
  • [7] Efficient and Universal Corruption Resilient Fountain Codes
    Cohen, Asaf
    Dolev, Shlomi
    Tzachar, Nir
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (10) : 4058 - 4066
  • [8] An Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    [J]. IEEE COMMUNICATIONS LETTERS, 2016, 20 (05) : 918 - 921
  • [9] Characterization of Band Codes for Pollution-Resilient Peer-to-Peer Video Streaming
    Fiandrotti, Attilio
    Gaeta, Rossano
    Grangetto, Marco
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2016, 18 (06) : 1138 - 1148
  • [10] Band Codes for Energy-Efficient Network Coding With Application to P2P Mobile Streaming
    Fiandrotti, Attilio
    Bioglio, Valerio
    Grangetto, Marco
    Gaeta, Rossano
    Magli, Enrico
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2014, 16 (02) : 521 - 532