Proceedings of the Second ACM Conference on Wireless Network Security 2009
DOI: 10.1145/1514274.1514292
|View full text |Cite
|
Sign up to set email alerts
|

Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks

Abstract: Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and lower power consumption. The core principle of network coding is that intermediate nodes actively mix input packets to produce output packets. This mixing subjects network coding systems to a severe security threat, known as a pollution attack, where attacker nodes inject corrupted packets into the network. Corrupted packets propagate i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
77
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 94 publications
(77 citation statements)
references
References 49 publications
(103 reference statements)
0
77
0
Order By: Relevance
“…For example, if we consider the routing problem, throughput decreases linearly with the number of attackers for simple attacks (e.g., black hole attack with randomly-placed adversaries), and it decreases much more sharply for more sophisticated attacks (e.g., wormhole attacks with strategically-placed adversaries) [4,11]. A similar effect was observed for pollution attacks in intra-flow network coding systems [14]. However, the impact of the attacks on the routing protocol is drastically reduced when security mechanisms are applied on top of the unsecure system.…”
Section: Security Goalsmentioning
confidence: 70%
See 2 more Smart Citations
“…For example, if we consider the routing problem, throughput decreases linearly with the number of attackers for simple attacks (e.g., black hole attack with randomly-placed adversaries), and it decreases much more sharply for more sophisticated attacks (e.g., wormhole attacks with strategically-placed adversaries) [4,11]. A similar effect was observed for pollution attacks in intra-flow network coding systems [14]. However, the impact of the attacks on the routing protocol is drastically reduced when security mechanisms are applied on top of the unsecure system.…”
Section: Security Goalsmentioning
confidence: 70%
“…We expect that provisioning a network coding system with security mechanisms will also significantly reduce the impact of attacks. Indeed, this was shown to be true for pollution attacks in intra-flow network coding systems [14]. Therefore, another important security goal is to ensure at most a graceful degradation in performance as the number of attackers increases.…”
Section: Security Goalsmentioning
confidence: 99%
See 1 more Smart Citation
“…Set S is formed of the equations that have non-zero coefficient in this linear combination (lines [10][11][12][13][14]. If S has less than l elements, the last received equation is not innovative and it is dropped (line 4), and the operation continues (loop of lines [3][4][5][6][7][8][9][10][11][12][13][14][15]. If S has exactly l elements, we can assume that the last received equation is the (l + 1)-st intact equation, and S contains the first l intact equations received.…”
Section: Attack-resilient Decodingmentioning
confidence: 99%
“…While network coding has advantages in benign environments, its performance may seriously fall in the presence of an adversary [11], [12], [13]. We present a scheme that resists pollution attacks, meaning that our scheme makes possible successful decoding even if some compromised nodes store maliciously modified data.…”
Section: Introductionmentioning
confidence: 99%