Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding

被引:62
|
作者
Kehdi, Elias [1 ]
Li, Baochun [1 ]
机构
[1] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 1A1, Canada
来源
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5 | 2009年
关键词
D O I
10.1109/INFCOM.2009.5062036
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error correcting codes by generalizing some well known bounds in coding theory. Such codes are based on introducing redundancy in space domain. Other approaches require the use of homomorphic hashing functions, which are computationally expensive. In this paper, we present a novel and computationally efficient security algorithm, referred to as Null Keys, to detect and contain malicious attacks based on the subspace properties of random linear network coding. The participating nodes verify the integrity of a block by checking if it belongs to the subspace spanned by the source blocks. This is possible when every node has a vector orthogonal to all the combinations of the source blocks. These vectors, referred to as null keys, belong to the null space of the source blocks and go through a random combination when distributed by the source. Unlike previous security approaches, our Null Keys algorithm allows nodes to rapidly detect corrupted blocks without changing the code or imposing redundancy on the exchanged data. We analytically evaluate the pollution produced by jamming attacks, and demonstrate the effectiveness of Null Keys by varying the strength of the malicious nodes. We also show, through extensive simulations, that the Null Keys approach is more effective than cooperative security using homomorphic hashing when it comes to limiting the pollution spread.
引用
收藏
页码:1224 / 1232
页数:9
相关论文
共 50 条
  • [1] An Efficient Short Null Keys Based Scheme for Securing Network Coding Against Pollution Attacks
    Wang, Junsheng
    Wang, Jin
    Zhu, Yanqin
    Jia, Chengjin
    FRONTIERS IN INTERNET TECHNOLOGIES, 2015, 502 : 16 - 31
  • [2] A Null Space-based MAC Scheme against Pollution Attacks to Random Linear Network Coding
    Esfahani, Alireza
    Mantas, Georgios
    Rodriguez, Jonathan
    Nascimento, Alberto
    Neves, Jose Carlos
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 1521 - 1526
  • [3] PROPERTIES OF A REPRESENTATION OF A BASIS FOR THE NULL SPACE
    GILL, PE
    MURRAY, W
    SAUNDERS, MA
    STEWART, GW
    WRIGHT, MH
    MATHEMATICAL PROGRAMMING, 1985, 33 (02) : 172 - 186
  • [4] Machine Unlearning via Null Space Calibration
    Chen, Huiqiang
    Zhu, Tianqing
    Yu, Xin
    Zhou, Wanlei
    PROCEEDINGS OF THE THIRTY-THIRD INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2024, 2024, : 358 - 366
  • [5] Stable low-rank matrix recovery via null space properties
    Kabanava, Maryia
    Kueng, Richard
    Rauhut, Holger
    Terstiege, Ulrich
    INFORMATION AND INFERENCE-A JOURNAL OF THE IMA, 2016, 5 (04) : 405 - 441
  • [6] PROPERTIES OF A REPRESENTATION OF A BASIS FOR THE NULL SPACE.
    Gill, Philip E.
    Murray, Walter
    Saunders, Michael A.
    Stewart, G.W.
    Wright, Margaret H.
    1600, (33):
  • [7] Resisting Malicious Attacks via Secure Network Coding and Incentive Compatible Mechanism in Multihop Wireless Networks
    Chen, Siguang
    Wu, Meng
    Lu, Weifeng
    JOURNAL OF COMPUTERS, 2010, 5 (11) : 1706 - 1714
  • [8] Learning of Dynamical Systems under Adversarial Attacks - Null Space Property Perspective
    Feng, Han
    Yalcin, Baturalp
    Lavaei, Javad
    2023 AMERICAN CONTROL CONFERENCE, ACC, 2023, : 4179 - 4184
  • [9] Null Space Precoding for Downlink Network MIMO Systems With no CSI
    Sadeghzadeh, Mehdi
    Beygi, Sajjad
    Bahrami, Hamid Reza
    2011 IEEE VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2011,
  • [10] Saliency detection via background and foregrond null space learning
    Zhang, Ying Ying
    Zhang, Shuo
    Zhang, Ping
    Zhang, XinGang
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 70 : 271 - 281