Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2012 (2012), Article ID 184783, 14 pages
http://dx.doi.org/10.1155/2012/184783
Research Article

Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures

1CITI laboratory, INSA-Lyon, INRIA, Université de Lyon, 69621 Lyon, France
2Department of Computer Science and Technology, East China Normal University, No. 500 Dongchuan Road, Shanghai 200241, China

Received 27 April 2012; Revised 30 July 2012; Accepted 27 September 2012

Academic Editor: Gildas Avoine

Copyright © 2012 Yuanyuan Zhang and Marine Minier. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Lima, J. Barros, and M. Médard, “Random linear network coding: a free cypher?” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), pp. 176–180, Nice, France, July 2007.
  2. N. Cai and R. W. Yeung, “Secure network coding,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '02), p. 323, July 2002. View at Scopus
  3. S. Y. El Rouayheb and E. Soljanin, “On Wiretap networks II,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), pp. 551–555, Nice, France, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  4. Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, “An efficient scheme for securing XOR network coding against pollution attacks,” in Proceedings of the 28th IEEE Communications Society Conference on Computer Communications (IEEE INFOCOM '09), pp. 406–414, Rio de Janeiro, Brazil, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, “An efficient signature-based scheme for securing network coding against pollution attacks,” in Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (IEEE INFOCOM '08), pp. 2083–2091, Phoenix, Ariz, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Dong, R. Curtmola, and C. Nita-Rotaru, “Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks,” in Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec '09), pp. 111–122, ACM, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. A. Apavatjrut, W. Znaidi, A. Fraboulet, C. Goursaud, C. Lauradoux, and M. Minier, “Energy friendly integrity for network coding in wireless sensor networks,” in Proceedings of the 4th International Conference on Network and System Security (NSS '10), pp. 223–230, IEEE, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. D. Charles, K. Jain, and K. Lauter, “Signatures for network coding,” International Journal in Information and Coding Theory, vol. 1, no. 1, pp. 3–14, 2009. View at Google Scholar
  9. D. Boneh, D. Freeman, J. Katz, and B. Waters, “Signing a linear subspace: signature schemes for network coding,” in Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography (PKC '09), vol. 5443 of Lecture Notes in Computer Science, pp. 68–87, Springer, Irvine, Calif, USA, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Agrawal and D. Boneh, “Homomorphic MACs: MAC-based integrity for network coding,” in Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09), vol. 5536 of Lecture Notes in Computer Science, pp. 292–305, Paris, France, 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Dong, R. Curtmola, and C. Nita-Rotaru, “Secure network coding for wireless mesh networks: threats, challenges, and directions,” Computer Communications, vol. 32, no. 17, pp. 1790–1801, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni, “Analysis of a denial of service attack on TCP,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 208–223, IEEE Computer Society, Oakland, Calif, USA, May 1997. View at Scopus
  13. R. Ahlswede, N. Cai, S. Y. R. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204–1216, 2000. View at Publisher · View at Google Scholar · View at Scopus
  14. T. Ho and D. Lun, Network Coding: an Introduction, Cambridge University Press, 2008.
  15. R. W. Yeung, S.-Y. R. Li, N. Cai, and Z. Zhang, Network Coding Theory, NOW Publishers, 2005.
  16. J. Cannons, R. Dougherty, C. Freiling, and K. Zeger, “Network routing capacity,” IEEE Transactions on Information Theory, vol. 52, no. 3, pp. 777–788, 2006. View at Publisher · View at Google Scholar · View at Scopus
  17. T. Ho, M. Médard, R. Koetter et al., “A random linear network coding approach to multicast,” IEEE Transactions on Information Theory, vol. 52, no. 10, pp. 4413–4430, 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 255–265, ACM, Boston, Mass, USA, August 2000. View at Scopus
  20. H. Krawczyk, “LFSR-based hashing and authentication,” in Proceedings of the Annual International Cryptology Conference (CRYPTO '94), vol. 839 of Lecture Notes in Computer Science, pp. 129–139, Springer, Santa Barbara, Calif, USA, 1994.
  21. H. Krawczyk, M. Bellare, and R. Canetti, “HMAC: Keyed-Hashing for Message Authentication,” 1997, rFC 2104.
  22. J. Black and P. Rogaway, “CBC MACs for arbitrary-length messages: the three-key constructions,” Journal of Cryptology, vol. 18, no. 2, pp. 111–131, 2005. View at Publisher · View at Google Scholar · View at Scopus
  23. L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), pp. 41–47, ACM, Washingtion, DC, USA, November 2002. View at Scopus
  24. S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, “XORs in the air: practical wireless network coding,” IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 497–510, 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. O. Erdene-Ochir, M. Minier, F. Valois, and A. Kountouris, “Toward resilient routing in wireless sensor networks: gradient-based routing in focus,” in Proceedings of the 4th International Conference on Sensor Technologies and Applications (SENSORCOMM '10), pp. 478–483, Venice, Italy, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Faruque and A. Helmy, “Gradient-based routing in sensor networks,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 7, no. 4, pp. 50–52, 2003. View at Google Scholar
  27. A. Fraboulet, G. Chelius, and E. Fleury, “Worldsens: development and prototyping tools for application specific wireless sensors networks,” in Proceedings of the 6th International Symposium on Information Processing in Sensor Networks (IPSN '07), pp. 176–185, ACM, April 2007. View at Publisher · View at Google Scholar · View at Scopus
  28. M. Médard and R. Koetter, “Beyond routing: an algebraic approach to network coding,” in Proceedings of the IEEE Communications Society Conference on Computer Communications (IEEE INFOCOM '02), pp. 122–130, IEEE, New York, NY, USA, June 2002. View at Scopus