627
Views
5
CrossRef citations to date
0
Altmetric
Articles

A novel approach for anti-pollution attacks in network coding

, , , &
Pages 447-462 | Received 07 Jul 2020, Accepted 04 Oct 2020, Published online: 02 Apr 2021

Figures & data

Figure 1. System model: multi-cast network.

Figure 1. System model: multi-cast network.

Figure 2. Message coding process.

Figure 2. Message coding process.

Figure 3. Pollution threats. In Figure , once P is adversary, the bogus message eP must be generated, and Q or I will receive message eP. After that, Q or I will make a combination with eP and their own message eQ or eI to generate transmission data c1eP+c2eQ(or c3eP+c4eI). As the data is polluted, J(or K) can not harvest the source data.

Figure 3. Pollution threats. In Figure 3, once P is adversary, the bogus message eP′ must be generated, and Q or I will receive message eP′. After that, Q or I will make a combination with eP′ and their own message eQ or eI to generate transmission data c1eP′+c2eQ(or c3eP′+c4eI). As the data is polluted, J(or K) can not harvest the source data.

Table 1. Notations.

Figure 4. With no key or illegal key attacks. Suppose M is an adversary, so when bogus data is injected to the network, R immediately advocates that the data from the node M is polluted after verifying the MACs of M.

Figure 4. With no key or illegal key attacks. Suppose M is an adversary, so when bogus data is injected to the network, R immediately advocates that the data from the node M is polluted after verifying the MACs of M.

Figure 5. With legal key attacks. Under this situation, there may exist defamation. For example, when P intends to disparage R, it send alerts to SCS and report R as an adversary. In this situation, SCS can quickly make correct judgement by verifying the transmission messages from the node R.

Figure 5. With legal key attacks. Under this situation, there may exist defamation. For example, when P intends to disparage R, it send alerts to SCS and report R as an adversary. In this situation, SCS can quickly make correct judgement by verifying the transmission messages from the node R.

Table 2. Comparison.

Figure 6. Network delay.

Figure 6. Network delay.

Figure 7. Throughput.

Figure 7. Throughput.

Figure 8. Delay of identification.

Figure 8. Delay of identification.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.