[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2184751.2184815acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Cooperatively securing network coding against pollution attacks with incentive mechanism

Published: 20 February 2012 Publication History

Abstract

The availability of network system with network coding can suffer from malicious nodes intentionally corrupt the encoded packets. The situation will get even worse when there are selfish nodes that are unwilling to take the measure of security mechanism. In such situation, selfish nodes should be motivated to follow the protocol, and malicious nodes need to be detected. We integrate an efficient Homomorphic MAC with a lightweight non-repudiation transmission protocol which can not only detect the corrupted packets but also locate the malicious nodes. In order to deal with the selfish behavior, we propose an incentive scheme which can encourage the nodes to follow the protocol faithfully and detect the pollution attacks. In addition, we analyze the relationship between security and parameters of the protocol, which can help to choose the better parameters the system requires. From the evaluated results, we can see that our design can effectively defense against pollution attacks in the system with network coding with high security and good performance.

References

[1]
S. Agrawal and D. Boneh. Homomorphic macs: Mac-based integrity for network coding. In Proceedings of Applied Cryptography and Network Security, pages 292--305, 2009.
[2]
R. Ahlswede, N. Cai, S. Y. R. Li, and R. W. Yeung. Network information flow. IEEE Transactions on Information Theory, 46(4):1204--1216, 2000.
[3]
S. Chachulski, M. Jennings, S. Katti, and D. Katabi. Trading structure for randomness in wireless opportunistic routing. SIGCOMM Comput. Commun. Rev., 37(4):169--180, August 2007.
[4]
T. Chen and S. Zhong. Inpac: An enforceable incentive scheme for wireless networks using network coding. In Proceedings of IEEE INFOCOM, 2010.
[5]
J. Dong, R. Curtmola, and C. Nita-Rotaru. Secure network coding for wireless mesh networks: Threats, challenges, and directions. Computer Communications, 32(17):1790--1801, Nov. 2009.
[6]
S. Fu, K. Lu, Y. Qian, and M. Varanasi. Cooperative network coding for wireless ad-hoc networks. In Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE, pages 812--816, 2007.
[7]
C. Gkantsidis and P. R. Rodriguez. Cooperative security for network coding file distribution. In Proceedings of IEEE INFOCOM, 2006.
[8]
M. Gupta, P. Judge, and M. Ammar. A reputation system for peer-to-peer networks. In Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video, NOSSDAV '03, pages 144--152, 2003.
[9]
T. Ho, M. Medard, R. Koetter, D. Karger, M. Effros, J. Shi, and B. Leong. A random linear network coding approach to multicast. IEEE Transactions on Information Theory, 52(10):4413--4430, Oct. 2006.
[10]
J. J. Jaramillo and R. Srikant. Darwin: distributed and adaptive reputation mechanism for wireless ad-hoc networks. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 87--98, 2007.
[11]
S. Katti, D. Katabi, H. Balakrishnan, and M. Medard. Symbol-level network coding for wireless mesh networks. In Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pages 401--412, 2008.
[12]
S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft. Xors in the air: practical wireless network coding. SIGCOMM Comput. Commun. Rev., 36(4):243--254, August 2006.
[13]
M. N. Krohn, M. J. Freedman, and D. Mazieres. On-the-fly verification of rateless erasure codes for efficient content distribution. In Proceedings of IEEE Symposium on Security and Privacy, pages 226--240, 2004.
[14]
A. Le and A. Markopoulou. Locating by zantine attackers in intra-session network coding using spacemac. In Proceedings of the 2010 IEEE International Symposium on Network Coding, 2010.
[15]
S.-Y. Li, R. Yeung, and N. Cai. Linear network coding. IEEE Transactions on Information Theory, 49(2):371--381, Feb. 2003.
[16]
Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen. Ripple authentication for network coding. In Proceedings of IEEE INFOCOM, March 2010.
[17]
Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana. Mis: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming. In Proceedings of IEEE INFOCOM, March 2010.
[18]
F. Wu, T. Chen, and S. Zhong. Incentive compatible opportunistic routing for wireless networks. In Proceedings of ACM MOBICOM, 2008.
[19]
H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen. Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks. Vehicular Technology, IEEE Transactions on, 58(8):4628--4639, 2009.

Cited By

View all
  • (2017)Social Norm Incentives for Network Coding in ManetsIEEE/ACM Transactions on Networking10.1109/TNET.2017.265605925:3(1761-1774)Online publication date: 1-Jun-2017
  • (2014)A Survey of Security Network Coding toward Various AttacksProceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2014.35(252-259)Online publication date: 24-Sep-2014
  • (2014)An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic RoutingIEEE Transactions on Vehicular Technology10.1109/TVT.2014.231217163:9(4476-4491)Online publication date: Nov-2014
  • Show More Cited By

Index Terms

  1. Cooperatively securing network coding against pollution attacks with incentive mechanism

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICUIMC '12: Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
    February 2012
    852 pages
    ISBN:9781450311724
    DOI:10.1145/2184751
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 February 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. communication networks
    2. incentive mechanism
    3. network coding
    4. pollution attacks

    Qualifiers

    • Research-article

    Conference

    ICUIMC '12
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 251 of 941 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)Social Norm Incentives for Network Coding in ManetsIEEE/ACM Transactions on Networking10.1109/TNET.2017.265605925:3(1761-1774)Online publication date: 1-Jun-2017
    • (2014)A Survey of Security Network Coding toward Various AttacksProceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2014.35(252-259)Online publication date: 24-Sep-2014
    • (2014)An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic RoutingIEEE Transactions on Vehicular Technology10.1109/TVT.2014.231217163:9(4476-4491)Online publication date: Nov-2014
    • (2013)Network security situation awareness based on intercepting the threat spreadProceedings of 2013 3rd International Conference on Computer Science and Network Technology10.1109/ICCSNT.2013.6967245(876-879)Online publication date: Oct-2013

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media