The Community for Technology Leaders
Sensor Networks, Ubiquitous, and Trustworthy Computing, International Conference on (2010)
Newport Beach, California
June 7, 2010 to June 9, 2010
ISBN: 978-0-7695-4049-8
pp: 66-73
We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decoding algorithm which makes it possible to find adversarial blocks using one more encoded block than strictly necessary for decoding. Our scheme fits well to the requirements of sensor networks, because it operates with adding very low computational and communication overhead to source and storage nodes, only the collector node needs to perform some additional computation. Our approach does not apply cryptography, hence it works in environments where no pre-shared keys, secure channels or PKI are available, which is often the case in sensor networks.

L. Buttyán, I. Vajda and L. Czap, "Pollution Attack Defense for Coding Based Sensor Storage," IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing (SUTC 2010)(SUTC), Newport Beach, CA, 2010, pp. 66-73.
92 ms
(Ver 3.3 (11022016))