The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.11 - Nov. (2013 vol.12)
pp: 2219-2232
Yongkun Li , The Chinese University of Hong Kong, Hong Kong
John C.S. Lui , The Chinese University of Hong Kong, Hong Kong
ABSTRACT
Epidemic attack is a severe security problem in network-coding-enabled wireless mesh networks (WMNs). Malicious nodes can easily launch such form of attack to create an epidemic spreading of polluted packets and deplete network resources. The contribution of this work is to address such security problem. We allow the presence of "smartâ attackers, i.e., they can pretend to be legitimate nodes to probabilistically transmit valid packets so as to reduce the chance of being detected. We also address the case where attackers cooperatively inject polluted packets. We employ the time-based checksum and batch verification to determine the existence of polluted packets, then propose a set of fully "distributedâ and "randomizedâ detection algorithms so that each legitimate node in a WMN can identify its malicious neighbors and purge them for future communication. We provide formal analysis to quantify the performance of the algorithms. Furthermore, simulation and system prototyping are carried out to validate the theoretic analysis and show the effectiveness and efficiency of the detection algorithms.
INDEX TERMS
Detection algorithms, Network coding, Routing protocols, Pollution, Encoding, Wireless mesh networks, Throughput,performance evaluation, Pollution attack, wireless mesh networks, network coding
CITATION
Yongkun Li, John C.S. Lui, "Epidemic Attacks in Network-Coding-Enabled Wireless Mesh Networks: Detection, Identification, and Evaluation", IEEE Transactions on Mobile Computing, vol.12, no. 11, pp. 2219-2232, Nov. 2013, doi:10.1109/TMC.2012.186
REFERENCES
[1] D. Aguayo, J.C. Bicket, S. Biswas, G. Judd, and R. Morris, "Link-Level Measurements from an 802.11b Mesh Network," Proc. ACM Special Interest Group on Data Comm. (SIGCOMM), pp. 121-132, 2004.
[2] R. Ahlswede, N. Cai, S.-Y.R. Li, and R.W. Yeung, "Network Information Flow," IEEE Trans. Information Theory, vol. 46, no. 4 pp. 1204-1216, July 2000.
[3] I. Akyildiz and X. Wang, "A Survey on Wireless Mesh Networks," IEEE Radio Comm., vol. 43, no. 9, pp. S23-S30, Sept. 2005.
[4] P. Bahl, R. Chandra, P.P.C. Lee, V. Misra, J. Padhye, D. Rubenstein, and Y. Yu, "Opportunistic Use of Client Repeaters to Improve Performance of WLANs," Proc. ACM Int'l Conf. Emerging Networking EXperiments and Technologies (CoNEXT), pp. 1-12, 2008.
[5] S. Biswas and R. Morris, "Opportunistic Routing in Multi-Hop Wireless Networks," ACM Special Interest Group on Data Comm. (SIGCOMM) Computer Comm. Rev., vol. 34, no. 1, pp. 69-74, 2004.
[6] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, "Trading Structure for Randomness in Wireless Opportunistic Routing," Proc. ACM Special Interest Group on Data Comm. (SIGCOMM '07), pp. 169-180, 2007.
[7] D.S.J.D Couto, D. Aguayo, J. Bicket, and R. Morris, "A High-Throughput Path Metric for Multi-Hop Wireless Routing," Proc. ACM MobiCom, pp. 134-146, 2003.
[8] J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical Defenses against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks," Proc. Second ACM Conf. Wireless Network Security (WiSec '09), pp. 111-122, 2009.
[9] J. Dong, R. Curtmola, R. Sethi, and C. Nita-Rotaru, "Toward Secure Network Coding in Wireless Networks: Threats and Challenges," Secure Network Protocols, 2008.
[10] C. Gkantsidis, W. Hu, P. Key, B. Radunovic, P. Rodriguez, and S. Gheorghiu, "Multipath Code Casting for Wireless Mesh Networks," Proc. ACM Int'l Conf. Emerging Networking EXperiments and Technologies (CoNEXT '07), pp. 1-12, 2007.
[11] T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, "Byzantine Modification Detection in Multicast Networks with Random Network Coding," IEEE Trans. Information Theory, vol. 54, no. 6, pp. 2798-2803, June 2008.
[12] T. Ho, M. Médard, J. Shi, M. Effros, and D. Karger, "On Randomized Network Coding," Proc. 41st Ann. Allerton Conf. Comm., Control and Computing, 2003.
[13] S. Katti, H.R.D. Katabi, W. Hu, and M. Medard, "The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments," Proc. 43rd Int'l Conf. Comm., Control and Computing, 2005.
[14] E. Kehdi and B. Li, "Null Keys: Limiting Malicious Attacks via Null Space Properties of Network Coding," Proc. IEEE INFOCOM, 2009.
[15] M.N. Krohn, M.J. Freedman, and D. Mazières, "On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution," Proc. IEEE Symp Security and Privacy, May 2004.
[16] R.K. Lam, D.-M. Chiu, and J.C.S. Lui, "On the Access Pricing and Network Scaling Issues of Wireless Mesh Networks," IEEE Trans. Computers, vol. 56, no. 11, pp. 1456-1469, Nov. 2007.
[17] J.N. Laneman, D.N.C. Tse, and G.W. Wornell, "Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior," IEEE Trans. Information Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
[18] A. Le and A. Markopoulou, "Locating Byzantine Attackers in Intra-Session Network Coding Using SpaceMac," Proc. IEEE Int'l Symp. Network Coding (NetCod), 2010.
[19] J. Le, J.C.S. Lui, and D.-M. Chiu, "DCAR: Distributed Coding-Aware Routing in Wireless Networks," IEEE Trans. Mobile Computing, vol. 9, no. 4, pp. 596-608, Apr. 2010.
[20] J. Le, J.C.S. Lui, and D.-M. Chiu, "On the Performance Bounds of Practical Wireless Network Coding," IEEE Trans. Mobile Computing, vol. 9, no. 8, pp. 1134-1146, Aug. 2010.
[21] S.-Y.R. Li, R.W. Yeung, and N. Cai, "Linear Network Coding," IEEE Trans. Information Theory, vol. 49, no. 2, pp. 371-381, Feb. 2003.
[22] A. Miu, H. Balakrishnan, and C.E. Koksal, "Improving Loss Resilience with Multi-Radio Diversity in Wireless Networks," Proc. ACM MobiCom, 2005.
[23] M. Siavoshani, C. Fragouli, and S. Diggavi, "On Locating Byzantine Attackers," Proc. Workshop Network Coding, Theory and Applications, 2008.
[24] S. Vyetrenko, A. Khosla, and T. Ho, "On Combining Information-Theoretic and Cryptographic Approaches to Network Coding Security against the Pollution Attack," Proc. 43rd Asilomar Conf. Signals, Systems and Computers (Asilomar '09), pp. 788-792, 2009.
62 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool