Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 4/2015

01.07.2015

Securing network coding against pollution attacks in P2P converged ubiquitous networks

verfasst von: Ming He, Zhenghu Gong, Lin Chen, Hong Wang, Fan Dai, Zhihong Liu

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 4/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Network coding has emerged as a promising approach for peer-to-peer converged ubiquitous networks to increase network capacity and solve the block reconciliation problem. However, peer-to-peer systems with network coding suffer a severe security threat, known as pollution attack, in which malicious peers inject corrupted packets into the information flow. Previous solutions are either computationally expensive or too ineffective to limit pollution attacks with arbitrary collusion among malicious peers. In this paper, we propose time keys, an efficient security scheme which allows participating peers to efficiently detect corrupted packets by using time and space properties of network coding. Our work is an innovative security solution to frustrate pollution attacks with collusion based on time and space properties of network coding. In addition, time keys scheme provides an efficient packet verification without requiring the existence of any extra secure channels. We also present security analysis and simulations of our scheme, and results demonstrate the practicality and efficiency of time keys scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
3.
Zurück zum Zitat Cai N, Chan T (2011) Theory of secure network coding. Proc IEEE 99(3):421–437CrossRef Cai N, Chan T (2011) Theory of secure network coding. Proc IEEE 99(3):421–437CrossRef
4.
Zurück zum Zitat Chung T-Y, Wang C-C, Chen Y-M, Chang Y-H (2008) Pnecos: a peer-to-peer network coding streaming system. In: Proceedings IEEE international conference sensor networks, ubiquitous and trustworthy computing SUTC ’08, pp 379–384 Chung T-Y, Wang C-C, Chen Y-M, Chang Y-H (2008) Pnecos: a peer-to-peer network coding streaming system. In: Proceedings IEEE international conference sensor networks, ubiquitous and trustworthy computing SUTC ’08, pp 379–384
5.
Zurück zum Zitat Xu J, Wang X, Zhao J, Lim A (2012) I-swifter: improving chunked network coding for peer-to-peer content distribution. Peer-to-Peer Netw Appl 5:30–39CrossRef Xu J, Wang X, Zhao J, Lim A (2012) I-swifter: improving chunked network coding for peer-to-peer content distribution. Peer-to-Peer Netw Appl 5:30–39CrossRef
6.
Zurück zum Zitat Silva D, Kschischang FR (2009) Universal weakly secure network coding. In: Proceedings IEEE information theory workshop networking and information theory (ITW 2009), pp 281–285 Silva D, Kschischang FR (2009) Universal weakly secure network coding. In: Proceedings IEEE information theory workshop networking and information theory (ITW 2009), pp 281–285
7.
Zurück zum Zitat Vilela JP, Lima L, Barros J (2008) Lightweight security for network coding. In: Proceedings IEEE international conference communications ICC ’08, pp 1750–1754 Vilela JP, Lima L, Barros J (2008) Lightweight security for network coding. In: Proceedings IEEE international conference communications ICC ’08, pp 1750–1754
8.
Zurück zum Zitat Jaggi S, Langberg M, Katti S, Ho T, Katabi D, Medard M (2007) Resilient network coding in the presence of byzantine adversaries. In: Proceedings INFOCOM 2007. 26th IEEE international conference computer communications. IEEE, pp 616–624 Jaggi S, Langberg M, Katti S, Ho T, Katabi D, Medard M (2007) Resilient network coding in the presence of byzantine adversaries. In: Proceedings INFOCOM 2007. 26th IEEE international conference computer communications. IEEE, pp 616–624
9.
Zurück zum Zitat Kehdi E, Li B (2009) Null keys: Limiting malicious attacks via null space properties of network coding. In: Proceedings IEEE INFOCOM 2009, pp 1224–1232 Kehdi E, Li B (2009) Null keys: Limiting malicious attacks via null space properties of network coding. In: Proceedings IEEE INFOCOM 2009, pp 1224–1232
10.
Zurück zum Zitat Dong J, Curtmola R, Nita-Rotaru C (2009) Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. In: Proceedings of the second ACM conference on wireless network security, WiSec ’09. ACM, New York, pp 111–122 Dong J, Curtmola R, Nita-Rotaru C (2009) Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. In: Proceedings of the second ACM conference on wireless network security, WiSec ’09. ACM, New York, pp 111–122
11.
Zurück zum Zitat Li Y, Yao H, Chen M, Jaggi S, Rosen A (2010) Ripple authentication for network coding. In: Proceedings IEEE INFOCOM, pp 1–9 Li Y, Yao H, Chen M, Jaggi S, Rosen A (2010) Ripple authentication for network coding. In: Proceedings IEEE INFOCOM, pp 1–9
12.
Zurück zum Zitat Ho T, Koetter R, Medard M, Karger D, Effros M (2003) The benefits of coding over routing in a randomized setting. In: Proceedings IEEE international symposium on information theory (ISIT 2003), pp 442–452 Ho T, Koetter R, Medard M, Karger D, Effros M (2003) The benefits of coding over routing in a randomized setting. In: Proceedings IEEE international symposium on information theory (ISIT 2003), pp 442–452
13.
Zurück zum Zitat Yu Z, Wei Y, Ramkumar B, Guan Y (2009) An efficient scheme for securing xor network coding against pollution attacks. In: Proceedings IEEE INFOCOM 2009, pp 406–414 Yu Z, Wei Y, Ramkumar B, Guan Y (2009) An efficient scheme for securing xor network coding against pollution attacks. In: Proceedings IEEE INFOCOM 2009, pp 406–414
14.
Zurück zum Zitat Tang Y, Xiao B, Lu X (2011) Signature tree generation for polymorphic worms. IEEE Trans Comput 60(4):565–579MathSciNetCrossRef Tang Y, Xiao B, Lu X (2011) Signature tree generation for polymorphic worms. IEEE Trans Comput 60(4):565–579MathSciNetCrossRef
15.
Zurück zum Zitat Boneh D, Freeman D, Katz J, Waters B (2009) Signing a linear subspace: signature schemes for network coding. In: Jarecki S, Tsudik G (eds) Public key cryptography C PKC 2009, vol. 5443 of lecture notes in computer science. Springer Berlin/Heidelberg, pp 68–87 Boneh D, Freeman D, Katz J, Waters B (2009) Signing a linear subspace: signature schemes for network coding. In: Jarecki S, Tsudik G (eds) Public key cryptography C PKC 2009, vol. 5443 of lecture notes in computer science. Springer Berlin/Heidelberg, pp 68–87
16.
Zurück zum Zitat Gkantsidis C, Rodriguez Rodriguez P (2006) Cooperative security for network coding file distribution. In: Proceedings 25th IEEE international conference computer communications INFOCOM 2006, pp 1–13 Gkantsidis C, Rodriguez Rodriguez P (2006) Cooperative security for network coding file distribution. In: Proceedings 25th IEEE international conference computer communications INFOCOM 2006, pp 1–13
Metadaten
Titel
Securing network coding against pollution attacks in P2P converged ubiquitous networks
verfasst von
Ming He
Zhenghu Gong
Lin Chen
Hong Wang
Fan Dai
Zhihong Liu
Publikationsdatum
01.07.2015
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 4/2015
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-013-0216-4

Weitere Artikel der Ausgabe 4/2015

Peer-to-Peer Networking and Applications 4/2015 Zur Ausgabe