Securing network coding against pollution attacks in P2P converged ubiquitous networks

被引:4
|
作者
He, Ming [1 ]
Gong, Zhenghu [1 ]
Chen, Lin [1 ]
Wang, Hong [1 ]
Dai, Fan [1 ]
Liu, Zhihong [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
Network coding; P2P; Ubiquitous networks; Security; Pollution attack;
D O I
10.1007/s12083-013-0216-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding has emerged as a promising approach for peer-to-peer converged ubiquitous networks to increase network capacity and solve the block reconciliation problem. However, peer-to-peer systems with network coding suffer a severe security threat, known as pollution attack, in which malicious peers inject corrupted packets into the information flow. Previous solutions are either computationally expensive or too ineffective to limit pollution attacks with arbitrary collusion among malicious peers. In this paper, we propose time keys, an efficient security scheme which allows participating peers to efficiently detect corrupted packets by using time and space properties of network coding. Our work is an innovative security solution to frustrate pollution attacks with collusion based on time and space properties of network coding. In addition, time keys scheme provides an efficient packet verification without requiring the existence of any extra secure channels. We also present security analysis and simulations of our scheme, and results demonstrate the practicality and efficiency of time keys scheme.
引用
收藏
页码:642 / 650
页数:9
相关论文
共 50 条
  • [41] An efficient ECC-based mechanism for securing network coding-based P2P content distribution
    He, Heng
    Li, Ruixuan
    Xu, Zhiyong
    Xiao, Weijun
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 572 - 589
  • [42] Analyzing the Resilience-Complexity Tradeoff of Network Coding in Dynamic P2P Networks
    Niu, Di
    Li, Baochun
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (11) : 1842 - 1850
  • [43] Network coding-based privacy protection scheme for mobile P2P networks
    [J]. Li, Zhiyuan, 1600, Science Press (51):
  • [44] Analysis of Pollution Disseminating Mode of P2P Network
    Mao, JunPeng
    Cui, Yanli
    Huang, JianHua
    Zhang, JianBiao
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL III, PROCEEDINGS, 2008, : 790 - +
  • [45] An efficient ECC-based mechanism for securing network coding-based P2P content distribution
    Heng He
    Ruixuan Li
    Zhiyong Xu
    Weijun Xiao
    [J]. Peer-to-Peer Networking and Applications, 2014, 7 : 572 - 589
  • [46] Securing P2P networks using peer reputations: Is there a silver bullet?
    Dewan, P
    Dasgupta, P
    [J]. CCNC: 2005 2ND IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2005, : 30 - 36
  • [47] Securing e-voting based on blockchain in P2P network
    Haibo Yi
    [J]. EURASIP Journal on Wireless Communications and Networking, 2019
  • [48] Securing e-voting based on blockchain in P2P network
    Yi, Haibo
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [49] Securing Coding-Based Cloud Storage Against Pollution Attacks
    Anglano, Cosimo
    Gaeta, Rossano
    Grangetto, Marco
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2017, 28 (05) : 1457 - 1469
  • [50] Analysis of File Pollution in P2P Networks with Epidemic Model
    Li, Zhongwen
    Li, Kuan-Ching
    Xie, Yi
    Jiang, Hai
    Shi, Liang
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (04): : 717 - 726