期刊文献+

基于声誉机制的网络编码抗污染攻击方案 被引量:1

Reputation-Based Defense Scheme Against Pollution Attacks on Network Coding
在线阅读 下载PDF
导出
摘要 网络编码在提高网络吞吐量方面有很大的优势,但是它极易受到污染攻击.目前针对此问题的多数解决方案都是针对有中心机制的网络.针对无中心机制的移动自组织网络,考虑移动自组网中节点的移动性和无固定的可信任第三方中心机制,结合已有的声誉机制研究,提出一种基于声誉机制的抗污染攻击方案对抗网络编码中的污染攻击.该方案采用对污染攻击进行检测和定位,在检测污染攻击存在的情况下,通过声誉机制对恶意节点进行定位,从而达到抗污染攻击的目的.通过实验仿真,与已有的方案进行比较,实验结果表明:针对无中心机制的方案在包的接收成功率上有一定提高,并且在多个恶意节点存在的情况下依然可以准确定位出恶意节点并将其隔离. Network coding is to apply innovative error-correction coding techniques in the network layer to improve network performance in both wired and wireless networks.It has been theoretically shown and experimentally demonstrated that if it is properly applied,it can significantly improve endto-end network throughput,and hence has attracted tremendous attention in the last fifteen years.Unfortunately,this technique also has some serious drawbacks.One of the major problems is its vulnerability to pollution attacks,where malicious nodes can inject corrupted packets to mess up with the decoding process.To deal with this serious problem,many schemes have been proposed in the literature,but most of them are centralized in the sense that a trusted central authority may be required.In this paper,we propose a novel distributed defense scheme based on some reputation mechanism by taking advantage of node mobility.The fundamental idea is to apply an effective reputation mechanism to locate potential malicious nodes whenever suspected polluted packets are detected.We have conducted extensive comparison studies of our proposed scheme and the existing ones,and demonstrated that the proposed scheme can achieve high successful packet delivery ratio by effectively locating and isolating the malicious nodes,even when there exist multiple malicious nodes in the network.
出处 《计算机研究与发展》 EI CSCD 北大核心 2016年第11期2491-2499,共9页 Journal of Computer Research and Development
基金 国家自然科学基金面上项目(61373038 61672106) 网络文化与数字传播北京市重点实验室开放课题(ICDD201408) 北京市教育委员会科技发展计划项目(KM201611232013)~~
关键词 污染攻击 网络编码 声誉机制 无线网络 安全 pollution attack network coding reputation mechanism wireless networks security
  • 相关文献

参考文献2

二级参考文献32

  • 1Krohn M, Freedman M, Mazieres D. On-the-fly verification of rateless erasure codes for efficient content distribution [C]//Proceedings-2004 1EEE Symposium on Security and Privacy. Berkeley: IEEE Computer Society, 2004: 226-239.
  • 2Charles D, Jain K, Lauter K. Signatures for network coding [C]//2006 40th Annual Conference on Information Sciences and Systems. Princeton: Institute of Electrical and Electronics Engineers Inc, 2007: 857-863.
  • 3Zhao F, Kalker T, Medard M, et al. Signatures for content distribution with network coding [C]// Proceedings 2007 IEEE International Symposium on Information Theory. Paris Institute of Electrical and Electronics Engineers Inc, 2007: 556-560.
  • 4Li Qiming, Chiu Dahming, Lui John C S. On the practical and security issues of batch content distribution via network coding [C]// 14th 1EEE International Conference on Network Protocols. Santa Barbara: IEEE Computer Society, 2006: 158-167.
  • 5Yu Z, Wei Y, Ramkumar B, et al. An efficient scheme for securing xor network coding against pollution attacks[C]// 28th Conference on Computer Communications. Rio de Janeiro: Institute of Electrical and Electronics Engineers Inc, 2009: 406-414.
  • 6Agrawal S, Boneh D. Homomorphic MACs: MAC-based integrity for network coding [C]//7th International Conference on Applied Cryptography and Network Security. Paris: Springer-Verlag, 2009: 292-305.
  • 7Chi Cheng, Tao Jiang. A novel homomorphic MAC scheme for authentication in network coding [J]. IEEE Communica- tion Letters, 201l, 15(11): 1228-1230.
  • 8Chi Cheng, Tao Jiang. An efficient homomorphic MAC with small key size for authentication in network coding [J]. IEEE Transactions on Computers, 2011, 10(2): 1-6.
  • 9Le A, Markopoulou A. Cooperative defense against pollution attacks in network coding using spacemac [J]. IEEE Journal on Selected Areas in Communications, 2012, 30(2): 442-449.
  • 10Li Y, Yao H, Chen M, et al. RIPPLE authentication for network coding [C]//IEEE International Coference on Computer Communications 2010. San Diego: Institute of Electrical and Electronics Engineers Inc, 2010: 1-9.

共引文献9

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部