MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming

作者: Qiyan Wang , Long Vu , Klara Nahrstedt , Himanshu Khurana

DOI: 10.1109/INFCOM.2010.5462226

关键词:

摘要: Network coding has been shown to be capable of greatly improving quality service in P2P live streaming systems (e.g., IPTV). However, network is vulnerable pollution attacks where malicious nodes inject into the bogus data blocks that are combined with other legitimate at downstream nodes, leading incapability decoding original and substantial degradation performance. In this paper, we propose a novel approach limiting by rapidly identifying nodes. Our scheme can fully satisfy requirements systems, achieves much higher efficiency than previous schemes. Each node our only needs perform several hash computations for an incoming block, incurring very small computational latency. The space overhead added each block 20 bytes. verification information given independent content thus does not need redistributed. simulation results based on real PPLive channel overlays show process takes few seconds even presence large number

参考文章(15)
Ralf Koetter, Frank R. Kschischang, Coding for Errors and Erasures in Random Network Coding international symposium on information theory. pp. 791- 795 ,(2007) , 10.1109/ISIT.2007.4557321
M.N. Krohn, M.J. Freedman, D. Mazieres, On-the-fly verification of rateless erasure codes for efficient content distribution ieee symposium on security and privacy. pp. 226- 240 ,(2004) , 10.1109/SECPRI.2004.1301326
Mea Wang, Baochun Li, How Practical is Network Coding international workshop on quality of service. ,vol. 23, pp. 274- 278 ,(2006) , 10.1109/IWQOS.2006.250480
M. Wang, B. Li, Lava: A Reality Check of Network Coding in Peer-to-Peer Live Streaming ieee international conference computer and communications. pp. 1082- 1090 ,(2007) , 10.1109/INFCOM.2007.130
Chen Feng, Baochun Li, On large-scale peer-to-peer streaming systems with network coding Proceeding of the 16th ACM international conference on Multimedia - MM '08. pp. 269- 278 ,(2008) , 10.1145/1459359.1459396
Denis Charles Kamal, Denis Charles, Kamal Jain, Kristin Lauter, Signatures for Network Coding conference on information sciences and systems. ,vol. 2006, pp. 857- 863 ,(2006) , 10.1109/CISS.2006.286587
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Medard, Resilient network coding in the presence of Byzantine adversaries ieee international conference computer and communications. pp. 616- 624 ,(2007) , 10.1109/INFCOM.2007.78
Z. Yu, Y. Wei, B. Ramkumar, Y. Guan, An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks international conference on computer communications. pp. 1409- 1417 ,(2008) , 10.1109/INFOCOM.2008.199
Z. Yu, Y. Wei, B. Ramkumar, Y. Guan, An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks international conference on computer communications. pp. 406- 414 ,(2009) , 10.1109/INFCOM.2009.5061945
E. Kehdi, B. Li, Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding international conference on computer communications. pp. 1224- 1232 ,(2009) , 10.1109/INFCOM.2009.5062036