Pollution attack defense for coding based sensor storage

L. Buttyán, Ĺszló Czap, István Vajda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decoding algorithm which makes it possible to find adversarial blocks using one more encoded block than strictly necessary for decoding. Our scheme fits well to the requirements of sensor networks, because it operates with adding very low computational and communication overhead to source and storage nodes, only the collector node needs to perform some additional computation. Our approach does not apply cryptography, hence it works in environments where no pre-shared keys, secure channels or PKI are available, which is often the case in sensor networks.

Original languageEnglish
Title of host publicationSUTC 2010 - 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, UMC 2010 - 2010 IEEE International Workshop on Ubiquitous and Mobile Computing
Pages66-73
Number of pages8
DOIs
Publication statusPublished - 2010
Event2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2010, 2010 IEEE International Workshop on Ubiquitous and Mobile Computing, UMC 2010 - Newport Beach, CA, United States
Duration: Jun 7 2010Jun 9 2010

Other

Other2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2010, 2010 IEEE International Workshop on Ubiquitous and Mobile Computing, UMC 2010
CountryUnited States
CityNewport Beach, CA
Period6/7/106/9/10

Fingerprint

Sensor networks
Pollution
Decoding
Sensors
Network coding
Cryptography
Communication

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Information Systems

Cite this

Buttyán, L., Czap, Ĺ., & Vajda, I. (2010). Pollution attack defense for coding based sensor storage. In SUTC 2010 - 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, UMC 2010 - 2010 IEEE International Workshop on Ubiquitous and Mobile Computing (pp. 66-73). [5504639] https://doi.org/10.1109/SUTC.2010.57

Pollution attack defense for coding based sensor storage. / Buttyán, L.; Czap, Ĺszló; Vajda, István.

SUTC 2010 - 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, UMC 2010 - 2010 IEEE International Workshop on Ubiquitous and Mobile Computing. 2010. p. 66-73 5504639.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Buttyán, L, Czap, Ĺ & Vajda, I 2010, Pollution attack defense for coding based sensor storage. in SUTC 2010 - 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, UMC 2010 - 2010 IEEE International Workshop on Ubiquitous and Mobile Computing., 5504639, pp. 66-73, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, SUTC 2010, 2010 IEEE International Workshop on Ubiquitous and Mobile Computing, UMC 2010, Newport Beach, CA, United States, 6/7/10. https://doi.org/10.1109/SUTC.2010.57
Buttyán L, Czap Ĺ, Vajda I. Pollution attack defense for coding based sensor storage. In SUTC 2010 - 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, UMC 2010 - 2010 IEEE International Workshop on Ubiquitous and Mobile Computing. 2010. p. 66-73. 5504639 https://doi.org/10.1109/SUTC.2010.57
Buttyán, L. ; Czap, Ĺszló ; Vajda, István. / Pollution attack defense for coding based sensor storage. SUTC 2010 - 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, UMC 2010 - 2010 IEEE International Workshop on Ubiquitous and Mobile Computing. 2010. pp. 66-73
@inproceedings{6e0d8b98bff6456fa83cf9697527e94e,
title = "Pollution attack defense for coding based sensor storage",
abstract = "We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decoding algorithm which makes it possible to find adversarial blocks using one more encoded block than strictly necessary for decoding. Our scheme fits well to the requirements of sensor networks, because it operates with adding very low computational and communication overhead to source and storage nodes, only the collector node needs to perform some additional computation. Our approach does not apply cryptography, hence it works in environments where no pre-shared keys, secure channels or PKI are available, which is often the case in sensor networks.",
author = "L. Butty{\'a}n and Ĺszl{\'o} Czap and Istv{\'a}n Vajda",
year = "2010",
doi = "10.1109/SUTC.2010.57",
language = "English",
isbn = "9780769540498",
pages = "66--73",
booktitle = "SUTC 2010 - 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, UMC 2010 - 2010 IEEE International Workshop on Ubiquitous and Mobile Computing",

}

TY - GEN

T1 - Pollution attack defense for coding based sensor storage

AU - Buttyán, L.

AU - Czap, Ĺszló

AU - Vajda, István

PY - 2010

Y1 - 2010

N2 - We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decoding algorithm which makes it possible to find adversarial blocks using one more encoded block than strictly necessary for decoding. Our scheme fits well to the requirements of sensor networks, because it operates with adding very low computational and communication overhead to source and storage nodes, only the collector node needs to perform some additional computation. Our approach does not apply cryptography, hence it works in environments where no pre-shared keys, secure channels or PKI are available, which is often the case in sensor networks.

AB - We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decoding algorithm which makes it possible to find adversarial blocks using one more encoded block than strictly necessary for decoding. Our scheme fits well to the requirements of sensor networks, because it operates with adding very low computational and communication overhead to source and storage nodes, only the collector node needs to perform some additional computation. Our approach does not apply cryptography, hence it works in environments where no pre-shared keys, secure channels or PKI are available, which is often the case in sensor networks.

UR - http://www.scopus.com/inward/record.url?scp=77958529104&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77958529104&partnerID=8YFLogxK

U2 - 10.1109/SUTC.2010.57

DO - 10.1109/SUTC.2010.57

M3 - Conference contribution

AN - SCOPUS:77958529104

SN - 9780769540498

SP - 66

EP - 73

BT - SUTC 2010 - 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, UMC 2010 - 2010 IEEE International Workshop on Ubiquitous and Mobile Computing

ER -