Securing network coding against pollution attacks in P2P converged ubiquitous networks

被引:4
|
作者
He, Ming [1 ]
Gong, Zhenghu [1 ]
Chen, Lin [1 ]
Wang, Hong [1 ]
Dai, Fan [1 ]
Liu, Zhihong [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
Network coding; P2P; Ubiquitous networks; Security; Pollution attack;
D O I
10.1007/s12083-013-0216-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding has emerged as a promising approach for peer-to-peer converged ubiquitous networks to increase network capacity and solve the block reconciliation problem. However, peer-to-peer systems with network coding suffer a severe security threat, known as pollution attack, in which malicious peers inject corrupted packets into the information flow. Previous solutions are either computationally expensive or too ineffective to limit pollution attacks with arbitrary collusion among malicious peers. In this paper, we propose time keys, an efficient security scheme which allows participating peers to efficiently detect corrupted packets by using time and space properties of network coding. Our work is an innovative security solution to frustrate pollution attacks with collusion based on time and space properties of network coding. In addition, time keys scheme provides an efficient packet verification without requiring the existence of any extra secure channels. We also present security analysis and simulations of our scheme, and results demonstrate the practicality and efficiency of time keys scheme.
引用
收藏
页码:642 / 650
页数:9
相关论文
共 50 条
  • [1] Securing network coding against pollution attacks in P2P converged ubiquitous networks
    Ming He
    Zhenghu Gong
    Lin Chen
    Hong Wang
    Fan Dai
    Zhihong Liu
    [J]. Peer-to-Peer Networking and Applications, 2015, 8 : 642 - 650
  • [2] TESLA-based defense against pollution attacks in P2P systems with network coding
    University of California, Irvine, CA, United States
    [J]. Int. Symp. Netw. Coding, NETCOD - Proc, 2011,
  • [3] On the robustness of three classes of rateless codes against pollution attacks in P2P networks
    Rossano Gaeta
    Marco Grangetto
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 3595 - 3604
  • [4] On the robustness of three classes of rateless codes against pollution attacks in P2P networks
    Gaeta, Rossano
    Grangetto, Marco
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (06) : 3595 - 3604
  • [5] Evaluating P2P Networks against Eclipse Attacks
    de Asis Lopez-Fuentes, Francisco
    Eugui-De-Alba, Inaki
    Ortiz-Ruiz, Otoniel M.
    [J]. 2012 IBEROAMERICAN CONFERENCE ON ELECTRONICS ENGINEERING AND COMPUTER SCIENCE, 2012, 3 : 61 - 68
  • [6] Pollution Attacks Identification in Structured P2P Overlay Networks
    Trifa, Zied
    Hajlaoui, Jalel Eddine
    Khemakhem, Maher
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 674 - 686
  • [8] Can network coding help in P2P networks?
    Chiu, Dah Ming
    Yeung, Raymond W.
    Huang, Jiaqing
    Fan, Bin
    [J]. 2006 4TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS, VOLS 1 AND 2, 2006, : 17 - +
  • [9] An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks
    Yu, Zhen
    Wei, Yawen
    Ramkumar, Bhuvaneswari
    Guan, Yong
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 406 - 414
  • [10] Securing Network Coding Architectures Against Pollution Attacks With Band Codes
    Fiandrotti, Attilio
    Gaeta, Rossano
    Grangetto, Marco
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) : 730 - 742