Abstract
The availab ility of network system with network coding can suffer from malicious nodes intentionally corrupt the encoded packets. T he sit uat ion will get even worse when t here are self ish nodes that are unwilling to take the measure of securit y mechanism. In such situation, selfish nodes should be motivated to follow the protocol, and malicious nodes need to be detected. We integrate an efficient Homomorphic MAC with a lightweight non-repudiation transmission protocol which can not only detect the corrupted packets but also locate the malicious nodes. In order to deal with the selfish behavior, we propose an incentive scheme which can encourage the nodes to follow the protocol faithfully and detect the pollution attacks. In addition, we analyze the relationship between security and parameters of the protocol, which can help to choose the better parameters the system requires. From the evaluated results, we can see that our design can effectively defense against pollution attacks in the system with network coding with high security and good performance.
Original language | English |
---|---|
Title of host publication | Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12 |
DOIs | |
Publication status | Published - May 8 2012 |
Event | 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12 - Kuala Lumpur, Malaysia Duration: Feb 20 2012 → Feb 22 2012 |
Other
Other | 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12 |
---|---|
Country/Territory | Malaysia |
City | Kuala Lumpur |
Period | 2/20/12 → 2/22/12 |
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
- Information Systems