A novel self-checking pollution attackers identification scheme in wireless network coding

Donghai Zhu, Xinyu Yang, Wei Yu
{"title":"A novel self-checking pollution attackers identification scheme in wireless network coding","authors":"Donghai Zhu, Xinyu Yang, Wei Yu","doi":"10.1109/CCNC.2014.6866593","DOIUrl":null,"url":null,"abstract":"Pollution attacks refer to ones where attackers modify and inject corrupted data packets into the wireless network with network coding to disrupt the decoding process. In the context of network coding, the epidemic effect of pollution attacks can degrade network throughput significantly because of the mixing nature of network coding. To address this issue, a number of malicious nodes identification schemes have been developed in the past. However, these schemes have their limitations and cannot effectively deal with pollution attacks. In this paper, we propose a novel light-weight Self-checking Pollution Attackers Identification Scheme (SPAIS), which can identify the pollution attackers effectively and efficiently. Through making full use of the broadcast nature of wireless media and insight that a well-behaved node can monitor its downstream neighboring nodes locally by cooperating with other nodes, SPAIS hierarchically organizes the network as levels such that the nodes in the same level can monitor their downstream level nodes cooperatively. Through the combination of theoretical analysis and extensive simulations, our experimental data demonstrates that SPAIS can more effectively identify pollution attackers with a lower cost in comparison with the existing representative schemes. For example, even if the quality of the network connection is not in good condition and the malicious nodes send only one corrupted packet, the pollution attackers can be identified with a high probability.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"7 2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC.2014.6866593","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Pollution attacks refer to ones where attackers modify and inject corrupted data packets into the wireless network with network coding to disrupt the decoding process. In the context of network coding, the epidemic effect of pollution attacks can degrade network throughput significantly because of the mixing nature of network coding. To address this issue, a number of malicious nodes identification schemes have been developed in the past. However, these schemes have their limitations and cannot effectively deal with pollution attacks. In this paper, we propose a novel light-weight Self-checking Pollution Attackers Identification Scheme (SPAIS), which can identify the pollution attackers effectively and efficiently. Through making full use of the broadcast nature of wireless media and insight that a well-behaved node can monitor its downstream neighboring nodes locally by cooperating with other nodes, SPAIS hierarchically organizes the network as levels such that the nodes in the same level can monitor their downstream level nodes cooperatively. Through the combination of theoretical analysis and extensive simulations, our experimental data demonstrates that SPAIS can more effectively identify pollution attackers with a lower cost in comparison with the existing representative schemes. For example, even if the quality of the network connection is not in good condition and the malicious nodes send only one corrupted packet, the pollution attackers can be identified with a high probability.
一种新的无线网络编码中自检污染攻击者识别方案
污染攻击是指攻击者通过网络编码修改并注入损坏的数据包到无线网络中,破坏解码过程的攻击。在网络编码环境下,由于网络编码的混合特性,污染攻击的流行效应会显著降低网络吞吐量。为了解决这个问题,过去已经开发了许多恶意节点识别方案。然而,这些方案有其局限性,不能有效地应对污染袭击。本文提出了一种新的轻量级自检查污染攻击者识别方案(SPAIS),该方案能够有效地识别污染攻击者。SPAIS充分利用无线媒体的广播特性,洞察到表现良好的节点可以通过与其他节点的协作局部监控其下游相邻节点,将网络分层组织,使同级节点能够协同监控其下游同级节点。通过理论分析和大量模拟相结合,我们的实验数据表明,与现有的代表性方案相比,SPAIS能够以更低的成本更有效地识别污染攻击者。例如,即使网络连接质量不佳,恶意节点只发送一个损坏数据包,也可以高概率地识别出污染攻击者。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信