TY - GEN
T1 - Entropy attacks and countermeasures in wireless network coding
AU - Newell, Andrew
AU - Curtmola, Reza
AU - Nita-Rotaru, Cristina
PY - 2012
Y1 - 2012
N2 - Multihop wireless networks gain higher performance by using network coding. However, using network coding also introduces new attacks such as the well-studied pollution attacks and less-studied entropy attacks. Unlike in pollution attacks where an attacker injects polluted packets (i.e., packets that are not linear combinations of the packets sent by the source), in entropy attacks an attacker creates noninnovative packets (i.e., packets that contain information already known by the system). In both cases the result is a severe degradation of the system performance. In this paper, we identify two variants of entropy attacks (local and global ) and show that while they share some characteristics with pollution attacks and selective forwarding, none of the techniques proposed to defend against such attacks are applicable to entropy attacks because the packets look legitimate and the packet forwarding is stealthy in nature. We propose and evaluate several defenses that vary in detection capabilities and overhead.
AB - Multihop wireless networks gain higher performance by using network coding. However, using network coding also introduces new attacks such as the well-studied pollution attacks and less-studied entropy attacks. Unlike in pollution attacks where an attacker injects polluted packets (i.e., packets that are not linear combinations of the packets sent by the source), in entropy attacks an attacker creates noninnovative packets (i.e., packets that contain information already known by the system). In both cases the result is a severe degradation of the system performance. In this paper, we identify two variants of entropy attacks (local and global ) and show that while they share some characteristics with pollution attacks and selective forwarding, none of the techniques proposed to defend against such attacks are applicable to entropy attacks because the packets look legitimate and the packet forwarding is stealthy in nature. We propose and evaluate several defenses that vary in detection capabilities and overhead.
KW - Entropy attacks
KW - Network coding
KW - Security
KW - Wireless
UR - http://www.scopus.com/inward/record.url?scp=84860694250&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84860694250&partnerID=8YFLogxK
U2 - 10.1145/2185448.2185473
DO - 10.1145/2185448.2185473
M3 - Conference contribution
AN - SCOPUS:84860694250
SN - 9781450312653
T3 - WiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks
SP - 185
EP - 196
BT - WiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks
T2 - 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec'12
Y2 - 16 April 2012 through 18 April 2012
ER -