An Efficient Short Null Keys Based Scheme for Securing Network Coding Against Pollution Attacks

作者: Junsheng Wang , Jin Wang , Yanqin Zhu , Chengjin Jia

DOI: 10.1007/978-3-662-46826-5_2

关键词:

摘要: Network coding has gained wide attention nowadays for its significant advantages on many aspects compared with traditional routing mechanism. However, if there are malicious nodes launching pollution attacks by tampering or forging data packets in the communication network, sink will suffer from failure decoding, together serious results such as bandwidth wasting, longer transmission delay and increasing computation overheads. The original null keys based detection scheme cannot efficiently defend against when system colluding attackers because of high Therefore, we firstly define concept complete space, property that no can pass verification. We then propose idea partial position design an algorithm to construct short keys. Secondly, provide a network coding, which lower overheads composing space. Finally, rigorous theoretical proofs given analyze security designed scheme.

参考文章(24)
Krishna R. Narayanan, Kapil Bhattad, Weakly Secure Network Coding ,(2005)
M.N. Krohn, M.J. Freedman, D. Mazieres, On-the-fly verification of rateless erasure codes for efficient content distribution ieee symposium on security and privacy. pp. 226- 240 ,(2004) , 10.1109/SECPRI.2004.1301326
Anh Le, Athina Markopoulou, Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac IEEE Journal on Selected Areas in Communications. ,vol. 30, pp. 442- 449 ,(2012) , 10.1109/JSAC.2012.120224
Jin Wang, Kejie Lu, Jianping Wang, Chunming Qiao, Untraceability of mobile devices in wireless mesh networks using linear network coding international conference on computer communications. pp. 270- 274 ,(2013) , 10.1109/INFCOM.2013.6566777
Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, Naijie Gu, Modeling and Optimal Design of Linear Network Coding for Secure Unicast with Multiple Streams IEEE Transactions on Parallel and Distributed Systems. ,vol. 24, pp. 2025- 2035 ,(2013) , 10.1109/TPDS.2012.265
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khurana, MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming international conference on computer communications. pp. 296- 300 ,(2010) , 10.1109/INFCOM.2010.5462226
Junsheng Wang, Jin Wang, Yanqin Zhu, Kejie Lu, SNKC: An Efficient On-the-Fly Pollution Detection Scheme for Content Distribution with Network Coding high performance computing and communications. pp. 2298- 2305 ,(2013) , 10.1109/HPCC.AND.EUC.2013.330
Andrew Newell, Cristina Nita-Rotaru, Split Null Keys: A null space based defense for pollution attacks in wireless network coding sensor mesh and ad hoc communications and networks. pp. 479- 487 ,(2012) , 10.1109/SECON.2012.6275815
R. Ahlswede, Ning Cai, S.-Y.R. Li, R.W. Yeung, Network information flow IEEE Transactions on Information Theory. ,vol. 46, pp. 1204- 1216 ,(2000) , 10.1109/18.850663
S.-Y.R. Li, R.W. Yeung, Ning Cai, Linear network coding IEEE Transactions on Information Theory. ,vol. 49, pp. 371- 381 ,(2003) , 10.1109/TIT.2002.807285