Cooperatively securing network coding against pollution attacks with incentive mechanism

作者: Yichao Xu , Kouichi Sakurai

DOI: 10.1145/2184751.2184815

关键词:

摘要: The availability of network system with coding can suffer from malicious nodes intentionally corrupt the encoded packets. situation will get even worse when there are selfish that unwilling to take measure security mechanism. In such situation, should be motivated follow protocol, and need detected. We integrate an efficient Homomorphic MAC a lightweight non-repudiation transmission protocol which not only detect corrupted packets but also locate nodes. order deal behavior, we propose incentive scheme encourage faithfully pollution attacks. addition, analyze relationship between parameters help choose better requires. From evaluated results, see our design effectively defense against attacks in high good performance.

参考文章(20)
Shweta Agrawal, Dan Boneh, Homomorphic MACs: MAC-Based Integrity for Network Coding Applied Cryptography and Network Security. pp. 292- 305 ,(2009) , 10.1007/978-3-642-01957-9_18
M.N. Krohn, M.J. Freedman, D. Mazieres, On-the-fly verification of rateless erasure codes for efficient content distribution ieee symposium on security and privacy. pp. 226- 240 ,(2004) , 10.1109/SECPRI.2004.1301326
Minaxi Gupta, Paul Judge, Mostafa Ammar, A reputation system for peer-to-peer networks network and operating system support for digital audio and video. pp. 144- 152 ,(2003) , 10.1145/776322.776346
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khurana, MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming international conference on computer communications. pp. 296- 300 ,(2010) , 10.1109/INFCOM.2010.5462226
Juan Jose Jaramillo, R. Srikant, DARWIN Proceedings of the 13th annual ACM international conference on Mobile computing and networking - MobiCom '07. pp. 87- 98 ,(2007) , 10.1145/1287853.1287865
Fan Wu, Tingting Chen, Sheng Zhong, Li Erran Li, Yang Richard Yang, None, Incentive-compatible opportunistic routing for wireless networks Proceedings of the 14th ACM international conference on Mobile computing and networking - MobiCom '08. pp. 303- 314 ,(2008) , 10.1145/1409944.1409979
Tingting Chen, Sheng Zhong, INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding international conference on computer communications. pp. 1828- 1836 ,(2010) , 10.1109/INFCOM.2010.5462003
Anh Le, Athina Markopoulou, None, Locating Byzantine Attackers in Intra-Session Network Coding Using SpaceMac 2010 IEEE International Symposium on Network Coding (NetCod). pp. 1- 6 ,(2010) , 10.1109/NETCOD.2010.5487673
T. Ho, M. Medard, R. Koetter, D.R. Karger, M. Effros, J. Shi, B. Leong, A Random Linear Network Coding Approach to Multicast IEEE Transactions on Information Theory. ,vol. 52, pp. 4413- 4430 ,(2006) , 10.1109/TIT.2006.881746
Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jaggi, Alon Rosen, RIPPLE Authentication for Network Coding international conference on computer communications. pp. 2258- 2266 ,(2010) , 10.1109/INFCOM.2010.5462051