Pollution attacks and defenses in wireless inter-flow network coding systems

Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, David Yau

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

We study data pollution attacks in wireless interflow network coding systems. Although several defenses for these attacks are known for intra-flow network coding systems, none of them are applicable to inter-flow coding systems. We classify pollution attacks in inter-flow coding systems based on the type of packets injected by the attacker and the attacks' impact on flows in the network. We identify a new attack, cross-flow pollution, which exploits the coding dependencies among flows to propagate pollution across flows. Our analysis shows that the effects of pollution attacks depend not only on the network topology, but also on the location and strategy of the attacker nodes. We propose a reactive attestation-based defense mechanism that uses efficient bit-level traceback and a novel cross-examination technique to unequivocally identify attacker nodes.

Original languageEnglish (US)
Title of host publication2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010
Pages1-6
Number of pages6
DOIs
StatePublished - 2010
Event2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010 - Boston, MA, United States
Duration: Jun 21 2010Jun 21 2010

Publication series

Name2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010

Other

Other2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010
CountryUnited States
CityBoston, MA
Period6/21/106/21/10

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Pollution attacks and defenses in wireless inter-flow network coding systems'. Together they form a unique fingerprint.

Cite this