Detection and recovery from pollution attacks in coding-based distributed storage schemes

L. Buttyán, László Czap, István Vajda

Research output: Contribution to journalArticle

15 Citations (Scopus)

Abstract

We address the problem of pollution attacks in coding-based distributed storage systems. In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original data upon retrieval. We propose algorithms to detect and recover from such attacks. In contrast to existing approaches to solve this problem, our approach is not based on adding cryptographic checksums or signatures to the encoded packets, and it does not introduce any additional redundancy to the system. The results of our analysis show that our proposed algorithms are suitable for practical systems, especially in wireless sensor networks.

Original languageEnglish
Article number5551158
Pages (from-to)824-838
Number of pages15
JournalIEEE Transactions on Dependable and Secure Computing
Volume8
Issue number6
DOIs
Publication statusPublished - 2011

Fingerprint

Pollution
Recovery
Redundancy
Decoding
Wireless sensor networks

Keywords

  • distributed data storage
  • integrity protection.
  • network coding
  • Network level security and protection
  • pollution attack
  • sensor networks

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Detection and recovery from pollution attacks in coding-based distributed storage schemes. / Buttyán, L.; Czap, László; Vajda, István.

In: IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 6, 5551158, 2011, p. 824-838.

Research output: Contribution to journalArticle

@article{861273f58c544632a8941e35e4c6dcee,
title = "Detection and recovery from pollution attacks in coding-based distributed storage schemes",
abstract = "We address the problem of pollution attacks in coding-based distributed storage systems. In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original data upon retrieval. We propose algorithms to detect and recover from such attacks. In contrast to existing approaches to solve this problem, our approach is not based on adding cryptographic checksums or signatures to the encoded packets, and it does not introduce any additional redundancy to the system. The results of our analysis show that our proposed algorithms are suitable for practical systems, especially in wireless sensor networks.",
keywords = "distributed data storage, integrity protection., network coding, Network level security and protection, pollution attack, sensor networks",
author = "L. Butty{\'a}n and L{\'a}szl{\'o} Czap and Istv{\'a}n Vajda",
year = "2011",
doi = "10.1109/TDSC.2010.36",
language = "English",
volume = "8",
pages = "824--838",
journal = "IEEE Transactions on Dependable and Secure Computing",
issn = "1545-5971",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "6",

}

TY - JOUR

T1 - Detection and recovery from pollution attacks in coding-based distributed storage schemes

AU - Buttyán, L.

AU - Czap, László

AU - Vajda, István

PY - 2011

Y1 - 2011

N2 - We address the problem of pollution attacks in coding-based distributed storage systems. In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original data upon retrieval. We propose algorithms to detect and recover from such attacks. In contrast to existing approaches to solve this problem, our approach is not based on adding cryptographic checksums or signatures to the encoded packets, and it does not introduce any additional redundancy to the system. The results of our analysis show that our proposed algorithms are suitable for practical systems, especially in wireless sensor networks.

AB - We address the problem of pollution attacks in coding-based distributed storage systems. In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original data upon retrieval. We propose algorithms to detect and recover from such attacks. In contrast to existing approaches to solve this problem, our approach is not based on adding cryptographic checksums or signatures to the encoded packets, and it does not introduce any additional redundancy to the system. The results of our analysis show that our proposed algorithms are suitable for practical systems, especially in wireless sensor networks.

KW - distributed data storage

KW - integrity protection.

KW - network coding

KW - Network level security and protection

KW - pollution attack

KW - sensor networks

UR - http://www.scopus.com/inward/record.url?scp=80052878696&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80052878696&partnerID=8YFLogxK

U2 - 10.1109/TDSC.2010.36

DO - 10.1109/TDSC.2010.36

M3 - Article

VL - 8

SP - 824

EP - 838

JO - IEEE Transactions on Dependable and Secure Computing

JF - IEEE Transactions on Dependable and Secure Computing

SN - 1545-5971

IS - 6

M1 - 5551158

ER -