The Community for Technology Leaders
Green Image
Issue No. 01 - Jan. (2014 vol. 25)
ISSN: 1045-9219
pp: 33-42
Xiaohu Wu , Key Lab. on High Performance Comput., Univ. of Sci. & Technol. of China, Hefei, China
Yinlong Xu , Key Lab. on High Performance Comput., Univ. of Sci. & Technol. of China, Hefei, China
Chau Yuen , Singapore Univ. of Technol. & Design, Singapore, Singapore
Liping Xiang , Key Lab. on High Performance Comput., Univ. of Sci. & Technol. of China, Hefei, China
ABSTRACT
Network coding allows intermediate nodes to encode data packets to improve network throughput and robustness. However, it increases the propagation speed of polluted data packets if a malicious node injects fake data packets into the network, which degrades the bandwidth efficiency greatly and leads to incorrect decoding at sinks. In this paper, insights on new mathematical relations in linear network coding are presented and a key predistribution-based tag encoding scheme KEPTE is proposed, which enables all intermediate nodes and sinks to detect the correctness of the received data packets. Furthermore, the security of KEPTE with regard to pollution attack and tag pollution attack is quantitatively analyzed. The performance of KEPTE is competitive in terms of: low computational complexity; the ability that all intermediate nodes and sinks detect pollution attack; the ability that all intermediate nodes and sinks detect tag pollution attack; and high fault-tolerance ability. To the best of our knowledge, the existing key predistribution-based schemes aiming at pollution detection can only achieve at most three points as described above. Finally, discussions on the application of KEPTE to practical network coding are also presented.
INDEX TERMS
Vectors, Pollution, Network coding, Encoding, Equations, Security, Educational institutions,security, Network coding, pollution attack, Byzantine attack, compromised nodes
CITATION
Xiaohu Wu, Yinlong Xu, Chau Yuen, Liping Xiang, "A Tag Encoding Scheme against Pollution Attack to Linear Network Coding", IEEE Transactions on Parallel & Distributed Systems, vol. 25, no. , pp. 33-42, Jan. 2014, doi:10.1109/TPDS.2013.24
289 ms
(Ver )