Securing Network Coding Architectures Against Pollution Attacks With Band Codes

被引:9
作者
Fiandrotti, Attilio [1 ]
Gaeta, Rossano [2 ]
Grangetto, Marco [2 ]
机构
[1] Telecom ParisTech, Images Donnees Signals Dept, F-75013 Paris, France
[2] Univ Torino, Dipartimento Informat, I-10129 Turin, Italy
关键词
Network coding; pollution attacks; secure video communications; peer to peer; distributed scheme; LIVE STREAMING SYSTEMS; EFFICIENT; SCHEME;
D O I
10.1109/TIFS.2018.2859583
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
During a pollution attack, malicious nodes purposely transmit bogus data to the honest nodes to cripple the communication. Securing the communication requires identifying and isolating the malicious nodes. However, in network coding (NC) architectures, random recombinations at the nodes increase the probability that honest nodes relay polluted packets. Thus, discriminating between honest and malicious nodes to isolate the latter turns out to be challenging at best. Band codes (BCs) are a family of rateless codes whose coding window size can be adjusted to reduce the probability that honest nodes relay polluted packets. We leverage such a property to design a distributed scheme for identifying the malicious nodes in the network. Each node counts the number of times that each neighbor has been involved in cases of polluted data reception and exchanges such counts with its neighbor nodes. Then, each node computes for each neighbor a discriminative honest score estimating the probability that the neighbor relays clean packets. We model such probability as a function of the BC coding window size, showing its impact on the accuracy and effectiveness of our distributed blacklisting scheme. We experiment distributing a live video feed in a P2P NC system, verifying the accuracy of our model and showing that our scheme allows us to secure the network against pollution attacks recovering near pre-attack video quality.
引用
收藏
页码:730 / 742
页数:13
相关论文
共 29 条
  • [21] Li Qiming, 2006, P WORKSH MULT SEC, P158
  • [22] Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems
    Li, Yongkun
    Lui, John C. S.
    [J]. PERFORMANCE EVALUATION, 2010, 67 (11) : 1273 - 1288
  • [23] An Authentication Code Against Pollution Attacks in Network Coding
    Oggier, Frederique
    Fathi, Hanane
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (06) : 1587 - 1596
  • [24] Papoulis A., 2002, PROBABILITY RANDOM V
  • [25] Performance Analysis of Network-Coding-Based P2P Live Streaming Systems
    Saleh, Bassel
    Qiu, Dongyu
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (04) : 2140 - 2153
  • [26] A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems
    Tong, Wei
    Zhong, Sheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2255 - 2267
  • [27] A Tag Encoding Scheme against Pollution Attack to Linear Network Coding
    Wu, Xiaohu
    Xu, Yinlong
    Yuen, Chau
    Xiang, Liping
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 33 - 42
  • [28] An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks
    Yu, Zhen
    Wei, Yawen
    Ramkumar, Bhuvaneswari
    Guan, Yong
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 406 - 414
  • [29] Zhang X., 2005, P IEEE INFOCOM, V3, P13