Entropy attacks and countermeasures in wireless network coding

Andrew Newell, Reza Curtmola, Cristina Nita-Rotaru

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Abstract

Multihop wireless networks gain higher performance by using network coding. However, using network coding also introduces new attacks such as the well-studied pollution attacks and less-studied entropy attacks. Unlike in pollution attacks where an attacker injects polluted packets (i.e., packets that are not linear combinations of the packets sent by the source), in entropy attacks an attacker creates noninnovative packets (i.e., packets that contain information already known by the system). In both cases the result is a severe degradation of the system performance. In this paper, we identify two variants of entropy attacks (local and global ) and show that while they share some characteristics with pollution attacks and selective forwarding, none of the techniques proposed to defend against such attacks are applicable to entropy attacks because the packets look legitimate and the packet forwarding is stealthy in nature. We propose and evaluate several defenses that vary in detection capabilities and overhead.

Original languageEnglish (US)
Title of host publicationWiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Pages185-196
Number of pages12
DOIs
StatePublished - 2012
Event5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec'12 - Tucson, AZ, United States
Duration: Apr 16 2012Apr 18 2012

Publication series

NameWiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks

Other

Other5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec'12
CountryUnited States
CityTucson, AZ
Period4/16/124/18/12

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Keywords

  • Entropy attacks
  • Network coding
  • Security
  • Wireless

Fingerprint Dive into the research topics of 'Entropy attacks and countermeasures in wireless network coding'. Together they form a unique fingerprint.

Cite this