• DocumentCode
    3103530
  • Title

    A trust-propagation-based scheme against pollution attacks in wireless network coding

  • Author

    Nosoohi, Mazaher ; Ghasemzadeh, Mohammad ; Bidoki, Ali Mohammad Zareh ; Abadi, Mohammad Arabzadeh Mohammad

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Yazd Univ., Yazd, Iran
  • fYear
    2011
  • fDate
    23-24 Feb. 2011
  • Firstpage
    131
  • Lastpage
    135
  • Abstract
    Network coding is a new paradigm that provides possibility to maximize network throughput, decrease power consumption, and increase reliability. Forwarder nodes in network coding system receive input packets and mix them to generate output packets. Because of mixing nature of network coding packets, these systems are vulnerable to pollution attacks, in which attacker can inject polluted packets into the network or corrupt input packets to generate polluted output packets. Forged packets and corrupted packets generated by adversaries propagate quickly into network and infect a large proportion of network nodes in an epidemic way. Existing mechanisms addressing pollution attacks either have high computational overhead which decreases network coding performance or need an extra secure channel. In this paper, we propose a Trust-Propagation-based scheme to identify and filter pollution attacks and dynamically detect and remove adversaries. In our scheme, network is divided into regions. In each region, there is one trusted node which detects pollution attacks and drops corrupted packets. If a node sends a corrupted packet to a trusted node, this trusted node decreases its trust in the sender. The sender in turn decreases its trust in the upstream sender node and this process continues recursively. If the receiver node´s trust in the sender one becomes smaller than is required, the sender node is known as an adversary. Experimental results show that our scheme can decrease computation overhead, latency and also increase throughput of the system significantly, and it´s the first scheme that dynamically detects and removes adversaries.
  • Keywords
    network coding; telecommunication network reliability; telecommunication security; computational overhead; corrupted packets; forged packets; forwarder nodes; network coding packets; network throughput; pollution attacks; receiver node trust; telecommunication network reliability; trust-propagation-based scheme; trusted nodes; upstream sender node; wireless network coding; Communication system security; Encoding; Network coding; Pollution; Public key; Throughput; Network coding; pollution attack; trust; trusted node;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Networks and Distributed Systems (CNDS), 2011 International Symposium on
  • Conference_Location
    Tehran
  • Print_ISBN
    978-1-4244-9153-7
  • Type

    conf

  • DOI
    10.1109/CNDS.2011.5764559
  • Filename
    5764559