An efficient ECC-based mechanism for securing network coding-based P2P content distribution

被引:6
|
作者
He, Heng [1 ]
Li, Ruixuan [1 ]
Xu, Zhiyong [2 ]
Xiao, Weijun [3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Suffolk Univ, Dept Math & Comp Sci, Boston, TX USA
[3] Virginia Commonwealth Univ, Dept Elect & Comp Engn, Richmond, VA USA
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Peer-to-peer; Network coding; Content distribution; Pollution attack; Attacker identification; Elliptic curve cryptography;
D O I
10.1007/s12083-013-0239-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding has been demonstrated to be able to improve the performance of P2P content distribution. However, it is vulnerable to pollution attacks where malicious peers can flood the network with corrupted blocks easily, leading to substantial performance degradation. Moreover, existing corruption detection schemes for network coding are not well suited to P2P systems. Effective scheme to detect the corruption and identify the attacker is required to thwart such attacks. In this paper, we propose an efficient ECC-based mechanism for securing network coding-based P2P content distribution, namely ESNC, which includes an efficient network coding signature scheme and an identity-based malicious peer identification scheme. The two schemes cooperate to thwart pollution attacks on network coding effectively in P2P networks, not only detecting corrupted blocks on-the-fly efficiently, but also precisely identifying all the malicious peers quickly. ESNC is mainly based on elliptic curve cryptography (ECC) and can provide high level of security. It incurs significantly less computation and communication overheads than other comparable state-of-the-art schemes for P2P systems. ESNC can work with arbitrary topologies, as it is the case in P2P networks. Security analysis demonstrates that ESNC can resist hash collision attacks, signature forgery attacks, and collusion attacks with arbitrary number of colluding malicious peers. Simulation results show that ESNC effectively limits the corruption spread and identifies all the malicious peers in a short time under different practical settings.
引用
收藏
页码:572 / 589
页数:18
相关论文
共 50 条
  • [31] Hierarchical P2P architecture for efficient content distribution
    Hasimoto-Beltran, Rogelio
    de Asis Lopez-Fuentes, Francisco
    Vera-Lopez, Misael
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (04) : 724 - 739
  • [32] Hierarchical P2P architecture for efficient content distribution
    Rogelio Hasimoto-Beltran
    Francisco de Asís Lopez-Fuentes
    Misael Vera-Lopez
    Peer-to-Peer Networking and Applications, 2019, 12 : 724 - 739
  • [33] Content-based music retrieval in P2P network
    Choi, Myung Sil
    Kim, Jae Yeol
    Chung, Kyung Ho
    Park, Yong Soo
    Ahn, Kwang Seon
    ALPIT 2007: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCED LANGUAGE PROCESSING AND WEB INFORMATION TECHNOLOGY, 2007, : 271 - +
  • [34] Strategy of content location of P2P based on the social network
    Huang Y.-S.
    Meng X.-W.
    Zhang Y.-J.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (10): : 2622 - 2630
  • [35] Network Coding-Based Multipath Content Transmission Mechanism in Content Centric Networking
    Zhang, Jianwei
    Ma, Linlin
    Cai, Zengyu
    Wang, Xuhui
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1012 - 1015
  • [36] P2P Streaming Media Transmission Algorithm Based on Network Coding
    Zhang, Ying-hui
    Tan, Ai-ping
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [37] A P2P streaming media transmission scheme based on network coding
    Wu, Min
    Wang, Ru-Chuan
    Han, Zhi-Jie
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2011, 32 (SUPPL.1): : 99 - 102
  • [38] P2P network lookup mechanism based on resource size
    Guo, Fang-Fang
    Yang, Yong-Tian
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (03): : 495 - 497
  • [39] Understanding Processing Overheads of Network Coding-Based Content Distribution in VANETs
    Lee, Uichin
    Lee, Seung-Hoon
    Lee, Kang-Won
    Gerla, Mario
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (11) : 2304 - 2318
  • [40] Optimizing efficiency of P2P content distribution with network coding: Principles, challenges, and future directions
    Lajam, Omar
    Mohammed, Salahadin
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 223