Cooperatively securing network coding against pollution attacks with incentive mechanism

Yichao Xu, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

The availab ility of network system with network coding can suffer from malicious nodes intentionally corrupt the encoded packets. T he sit uat ion will get even worse when t here are self ish nodes that are unwilling to take the measure of securit y mechanism. In such situation, selfish nodes should be motivated to follow the protocol, and malicious nodes need to be detected. We integrate an efficient Homomorphic MAC with a lightweight non-repudiation transmission protocol which can not only detect the corrupted packets but also locate the malicious nodes. In order to deal with the selfish behavior, we propose an incentive scheme which can encourage the nodes to follow the protocol faithfully and detect the pollution attacks. In addition, we analyze the relationship between security and parameters of the protocol, which can help to choose the better parameters the system requires. From the evaluated results, we can see that our design can effectively defense against pollution attacks in the system with network coding with high security and good performance.

Original languageEnglish
Title of host publicationProceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12
DOIs
Publication statusPublished - May 8 2012
Event6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12 - Kuala Lumpur, Malaysia
Duration: Feb 20 2012Feb 22 2012

Other

Other6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12
CountryMalaysia
CityKuala Lumpur
Period2/20/122/22/12

Fingerprint

Network coding
Pollution
Ions

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems

Cite this

Xu, Y., & Sakurai, K. (2012). Cooperatively securing network coding against pollution attacks with incentive mechanism. In Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12 [52] https://doi.org/10.1145/2184751.2184815

Cooperatively securing network coding against pollution attacks with incentive mechanism. / Xu, Yichao; Sakurai, Kouichi.

Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 2012. 52.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Xu, Y & Sakurai, K 2012, Cooperatively securing network coding against pollution attacks with incentive mechanism. in Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12., 52, 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12, Kuala Lumpur, Malaysia, 2/20/12. https://doi.org/10.1145/2184751.2184815
Xu Y, Sakurai K. Cooperatively securing network coding against pollution attacks with incentive mechanism. In Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 2012. 52 https://doi.org/10.1145/2184751.2184815
Xu, Yichao ; Sakurai, Kouichi. / Cooperatively securing network coding against pollution attacks with incentive mechanism. Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 2012.
@inproceedings{67b18aa095b6408aae48a1dae4016ca6,
title = "Cooperatively securing network coding against pollution attacks with incentive mechanism",
abstract = "The availab ility of network system with network coding can suffer from malicious nodes intentionally corrupt the encoded packets. T he sit uat ion will get even worse when t here are self ish nodes that are unwilling to take the measure of securit y mechanism. In such situation, selfish nodes should be motivated to follow the protocol, and malicious nodes need to be detected. We integrate an efficient Homomorphic MAC with a lightweight non-repudiation transmission protocol which can not only detect the corrupted packets but also locate the malicious nodes. In order to deal with the selfish behavior, we propose an incentive scheme which can encourage the nodes to follow the protocol faithfully and detect the pollution attacks. In addition, we analyze the relationship between security and parameters of the protocol, which can help to choose the better parameters the system requires. From the evaluated results, we can see that our design can effectively defense against pollution attacks in the system with network coding with high security and good performance.",
author = "Yichao Xu and Kouichi Sakurai",
year = "2012",
month = "5",
day = "8",
doi = "10.1145/2184751.2184815",
language = "English",
isbn = "9781450311724",
booktitle = "Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12",

}

TY - GEN

T1 - Cooperatively securing network coding against pollution attacks with incentive mechanism

AU - Xu, Yichao

AU - Sakurai, Kouichi

PY - 2012/5/8

Y1 - 2012/5/8

N2 - The availab ility of network system with network coding can suffer from malicious nodes intentionally corrupt the encoded packets. T he sit uat ion will get even worse when t here are self ish nodes that are unwilling to take the measure of securit y mechanism. In such situation, selfish nodes should be motivated to follow the protocol, and malicious nodes need to be detected. We integrate an efficient Homomorphic MAC with a lightweight non-repudiation transmission protocol which can not only detect the corrupted packets but also locate the malicious nodes. In order to deal with the selfish behavior, we propose an incentive scheme which can encourage the nodes to follow the protocol faithfully and detect the pollution attacks. In addition, we analyze the relationship between security and parameters of the protocol, which can help to choose the better parameters the system requires. From the evaluated results, we can see that our design can effectively defense against pollution attacks in the system with network coding with high security and good performance.

AB - The availab ility of network system with network coding can suffer from malicious nodes intentionally corrupt the encoded packets. T he sit uat ion will get even worse when t here are self ish nodes that are unwilling to take the measure of securit y mechanism. In such situation, selfish nodes should be motivated to follow the protocol, and malicious nodes need to be detected. We integrate an efficient Homomorphic MAC with a lightweight non-repudiation transmission protocol which can not only detect the corrupted packets but also locate the malicious nodes. In order to deal with the selfish behavior, we propose an incentive scheme which can encourage the nodes to follow the protocol faithfully and detect the pollution attacks. In addition, we analyze the relationship between security and parameters of the protocol, which can help to choose the better parameters the system requires. From the evaluated results, we can see that our design can effectively defense against pollution attacks in the system with network coding with high security and good performance.

UR - http://www.scopus.com/inward/record.url?scp=84860534495&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84860534495&partnerID=8YFLogxK

U2 - 10.1145/2184751.2184815

DO - 10.1145/2184751.2184815

M3 - Conference contribution

AN - SCOPUS:84860534495

SN - 9781450311724

BT - Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12

ER -