• DocumentCode
    61554
  • Title

    Simple Countermeasures to Mitigate the Effect of Pollution Attack in Network Coding-Based Peer-to-Peer Live Streaming

  • Author

    Fiandrotti, Attilio ; Gaeta, Rossano ; Grangetto, Marco

  • Author_Institution
    Sisvel Technol., None Torinese, Italy
  • Volume
    17
  • Issue
    4
  • fYear
    2015
  • fDate
    Apr-15
  • Firstpage
    562
  • Lastpage
    573
  • Abstract
    Network coding (NC)-based peer-to-peer (P2P) streaming represents an effective solution to aggregate user capacities and to increase system throughput in live multimedia streaming. Nonetheless, such systems are vulnerable to pollution attacks where a handful of malicious peers can disrupt the communication by transmitting just a few bogus packets which are then recombined and relayed by unaware honest nodes, further spreading the pollution over the network. Whereas previous research focused on malicious nodes identification schemes and pollution-resilient coding, in this paper we show pollution countermeasures which make a standard NC scheme resilient to pollution attacks. Thanks to a simple yet effective analytical model of a reference node collecting packets by malicious and honest neighbors, we demonstrate that: i) packets received earlier are less likely to be polluted, and ii) short generations increase the likelihood to recover a clean generation. Therefore, we propose a recombination scheme where nodes draw packets to be recombined according to their age in the input queue, paired with a decoding scheme able to detect the reception of polluted packets early in the decoding process and short generations. The effectiveness of our approach is experimentally evaluated in a real system we developed and deployed on hundreds to thousands of peers. Experimental evidence shows that, thanks to our simple countermeasures, the effect of a pollution attack is almost canceled and the video quality experienced by the peers is comparable to pre-attack levels.
  • Keywords
    network coding; peer-to-peer computing; security of data; P2P streaming; aggregate user capacities; bogus packets; live multimedia streaming; malicious nodes identification schemes; malicious peers; network coding-based peer-to-peer live streaming; polluted packets; pollution attacks; pollution countermeasures; pollution-resilient coding; preattack levels; reference node collecting packets; standard NC scheme resilient; unaware honest nodes; video quality; Decoding; Encoding; Payloads; Peer-to-peer computing; Pollution; Streaming media; Vectors; Continuity index; measurements; network coding; peer to peer (P2P); pollution attack;
  • fLanguage
    English
  • Journal_Title
    Multimedia, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1520-9210
  • Type

    jour

  • DOI
    10.1109/TMM.2015.2402516
  • Filename
    7038216