Browse > Article
http://dx.doi.org/10.13089/JKIISC.2020.30.1.29

Detection of Disguised Packet and Valid Reconstruction Identification Using Network Coding in IoT Environment  

Lee, Yong (Freelancer)
Abstract
Work to improve network throughput has been focused on network coding as the utilization of IoT-based application services increases and network usage increases rapidly. In network coding, nodes transform packets received from neighboring nodes into a combination of encoded packets for transmission and decoding at the destination. This scheme is based on trust among nodes, but in the IoT environment where nodes are free to join, a malicious node can fabricate the packet if it legally participates in the configuration. It is difficult to identify the authenticity of the encoded packet since the packet received at destination is not a single source but a combination of packets generated by several nodes. In this paper, we propose a method to detect "look-like-valid" packets that have been attacked and disguised in packets received at destination, and to identify valid messages in the reconstructions. This method shows that network coding performance is significantly improved because the destination can reconstruct a valid message with only received packets without retransmission with a high probability, despite the presence of disguised packets.
Keywords
Network Coding; IoT; Disguised Packet; Valid Reconstruction;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Barros, "Mixing Packets: Pros and Cons of Network Coding," The 11th WPMC, Sep. 2008
2 G. Peralta, R. Fuentes, J. Bilbao and P. Crespo, "Homomorphic Encryption and Network Coding in IoT Architectures: Advantages and Future Challenges," Electronics, vol. 8, no. 827, July 2019
3 A. Fuqaha, M. Guizani, M.Mohammadi, M. Aledhari and M. Ayyash, "Internet of Things:A Survey on Enabling Technologies, Protocols and Applications," IEEE Communication Surveys and Tutorials, vol. 17, no. 4, pp.2347-2376, June 2015   DOI
4 J. Li, Y. Liu, Z. Zhang, J. Ren and N. Zhao, "Towards Green IoT Networking: Performance Optimization of Network Coding Based Communication and Reliable Storage," IEEE Access, vol. 5, pp. 8780-8791, May 2017   DOI
5 D. Boneh, D. Freeman and J. Katz, "Signing a Linear Subspace: Signatures for Network Coding," PKC 2009, Mar. 2009
6 R. Ahlswede, N. Cai, S. Li, W. Yeung, "Network Information Flow," IEEE Trans. Information Theory, vol. 46, no. 4. pp. 1204-1216, July 2000   DOI
7 Z. Yu, Y. Wei, B. Ramkumar and Y. Guan, "An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks", IEEE INFOCOM 2009, pp. 406-414, 2009
8 T. Li, W. Chen, Y. Tang and H. Yan, "A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT," Security and Communication Networks, vol. 2018, June 2018
9 G. Wu, J. Wang, Y. Wang and L. Yao, "Pollution Attack Resistance Dissemination in VANETs Based on Network Coding," Procedia Computer Science, vol. 83, pp. 131-138, 2016   DOI
10 C. Cheng, J. Lee, T. Jiang and T. Takagi, "Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding", IEEE Trans. on Information Forensics and Security, vol. 11, no. 5, pp. 993-1002, May 2016   DOI
11 J. Li, T. Li, J. Ren and H. Chao, "Enjoy the Benefit of Network Coding: Combat Pollution Attacks in 5G Multihop Networks," Wireless Communications and Mobile Computing, vol. 2018, Dec. 2018
12 N. Mamidwar and D. Gothawal, "Schemes against Pollution Attack in Network Coding: A Survey," Intl. Journal of Computer Science and Information Technologies, vol. 6, no. 6, pp. 5085-5089, 2015
13 W. Cheng, L. Yu, F. Xiong and W. Wang, "Trusted Network Coding in Wireless Ad Hoc Networks," IEEE Globecom 2010, Oct. 2010
14 C. Oliveira, Y. Doudane, C. Brito and S. Lohier, "Optimal Network Coding-Based In-Network Data Storage and Data Retrieval for IoT/WSNs," IEEE 14th NCA, Sep. 2015
15 K. Lei, S. Zhong, K. Xu and H. Zhang, "An NDN IoT Content Distribution Model With Network Coding Enhanced Forwarding Strategy for 5G," IEEE Trans. on Industrial Informatics, vol. 14, no. 6, pp. 2725-2735, Jun. 2018   DOI
16 M. Rabin, "Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance," Journal of the ACM, vol. 36, no. 2, Apr. 1989