An efficient ECC-based mechanism for securing network coding-based P2P content distribution

被引:6
|
作者
He, Heng [1 ]
Li, Ruixuan [1 ]
Xu, Zhiyong [2 ]
Xiao, Weijun [3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Suffolk Univ, Dept Math & Comp Sci, Boston, TX USA
[3] Virginia Commonwealth Univ, Dept Elect & Comp Engn, Richmond, VA USA
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Peer-to-peer; Network coding; Content distribution; Pollution attack; Attacker identification; Elliptic curve cryptography;
D O I
10.1007/s12083-013-0239-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network coding has been demonstrated to be able to improve the performance of P2P content distribution. However, it is vulnerable to pollution attacks where malicious peers can flood the network with corrupted blocks easily, leading to substantial performance degradation. Moreover, existing corruption detection schemes for network coding are not well suited to P2P systems. Effective scheme to detect the corruption and identify the attacker is required to thwart such attacks. In this paper, we propose an efficient ECC-based mechanism for securing network coding-based P2P content distribution, namely ESNC, which includes an efficient network coding signature scheme and an identity-based malicious peer identification scheme. The two schemes cooperate to thwart pollution attacks on network coding effectively in P2P networks, not only detecting corrupted blocks on-the-fly efficiently, but also precisely identifying all the malicious peers quickly. ESNC is mainly based on elliptic curve cryptography (ECC) and can provide high level of security. It incurs significantly less computation and communication overheads than other comparable state-of-the-art schemes for P2P systems. ESNC can work with arbitrary topologies, as it is the case in P2P networks. Security analysis demonstrates that ESNC can resist hash collision attacks, signature forgery attacks, and collusion attacks with arbitrary number of colluding malicious peers. Simulation results show that ESNC effectively limits the corruption spread and identifies all the malicious peers in a short time under different practical settings.
引用
收藏
页码:572 / 589
页数:18
相关论文
共 50 条
  • [41] Securing network coding against pollution attacks in P2P converged ubiquitous networks
    He, Ming
    Gong, Zhenghu
    Chen, Lin
    Wang, Hong
    Dai, Fan
    Liu, Zhihong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) : 642 - 650
  • [42] Securing network coding against pollution attacks in P2P converged ubiquitous networks
    Ming He
    Zhenghu Gong
    Lin Chen
    Hong Wang
    Fan Dai
    Zhihong Liu
    Peer-to-Peer Networking and Applications, 2015, 8 : 642 - 650
  • [43] P2P VoD Content Distribution Strategy based on Gradient Model
    Dai Xiuyue
    Wang Qun
    Tang Yifang
    MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2265 - 2269
  • [44] Efficient Hierarchical Content Distribution using P2P Technology
    Jiang, Hai
    Li, Jun
    Li, Zhongcheng
    Liu, Jing
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 387 - 392
  • [45] Using Network Coding Make P2P Content Sharing Scalable
    Wei Li-shuang
    Song Wei
    Hu Wen-bin
    Hu Zheng-bing
    2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
  • [46] P2P Streaming Media on-demand Scheme Based on Network Coding
    Liu Hongpo
    Liu Kecheng
    Yang Xinfeng
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2056 - 2059
  • [47] RELOAD/CoAP P2P Overlays for Network Coding Based Constrained Environments
    Al-Hawri, Eman
    Correia, Noelia
    Barradas, Alvaro
    TECHNICAL INNOVATION FOR SMART SYSTEMS (DOCEIS 2017), 2017, 499 : 307 - 315
  • [48] Efficient Parallelized Network Coding for P2P File Sharing Applications
    Park, Karam
    Park, Joon-Sang
    Ro, Won W.
    ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2009, 5529 : 353 - +
  • [49] The incentive secure mechanism based on quality of service in P2P network
    Liu, Yuhua
    Li, Yuling
    Xiong, Naixue
    Park, Jong Hyuk
    Lee, Yang Sun
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 224 - 233
  • [50] An improved flooding based search mechanism in unstructured P2P network
    Lu, Wei
    Zhou, Tao
    Xing, Weiwei
    Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2015, 33 (02): : 342 - 350