Epidemic Attacks in Network-Coding-Enabled Wireless Mesh Networks: Detection, Identification, and Evaluation

Epidemic attack is a severe security problem in network-coding-enabled wireless mesh networks (WMNs). Malicious nodes can easily launch such form of attack to create an epidemic spreading of polluted packets and deplete network resources. The contribution of this work is to address such security problem. We allow the presence of "smartâ attackers, i.e., they can pretend to be legitimate nodes to probabilistically transmit valid packets so as to reduce the chance of being detected. We also address the case where attackers cooperatively inject polluted packets. We employ the time-based checksum and batch verification to determine the existence of polluted packets, then propose a set of fully "distributedâ and "randomizedâ detection algorithms so that each legitimate node in a WMN can identify its malicious neighbors and purge them for future communication. We provide formal analysis to quantify the performance of the algorithms. Furthermore, simulation and system prototyping are carried out to validate the theoretic analysis and show the effectiveness and efficiency of the detection algorithms.

[1]  John C. S. Lui,et al.  On the Performance Bounds of Practical Wireless Network Coding , 2010, IEEE Transactions on Mobile Computing.

[2]  Jing Dong,et al.  Toward secure network coding in wireless networks: Threats and challenges , 2008, 2008 4th Workshop on Secure Network Protocols.

[3]  Baochun Li,et al.  Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.

[4]  Reza Curtmola,et al.  Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.

[5]  Sachin Katti,et al.  Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM '07.

[6]  Tracey Ho,et al.  Byzantine Modification Detection in Multicast Networks With Random Network Coding , 2008, IEEE Transactions on Information Theory.

[7]  Robert Tappan Morris,et al.  Opportunistic routing in multi-hop wireless networks , 2004, Comput. Commun. Rev..

[8]  Gregory W. Wornell,et al.  Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.

[9]  Robert Tappan Morris,et al.  Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM '04.

[10]  C. Fragouli,et al.  On Locating Byzantine Attackers , 2008, 2008 Fourth Workshop on Network Coding, Theory and Applications.

[11]  Paramvir Bahl,et al.  Opportunistic Use of Client Repeaters to Improve Performance of WLANs , 2008, IEEE/ACM Transactions on Networking.

[12]  John C. S. Lui,et al.  DCAR: Distributed Coding-Aware Routing in Wireless Networks , 2008, IEEE Transactions on Mobile Computing.

[13]  T. Ho,et al.  On Linear Network Coding , 2010 .

[14]  Athina Markopoulou,et al.  Locating Byzantine Attackers in Intra-Session Network Coding Using SpaceMac , 2010, 2010 IEEE International Symposium on Network Coding (NetCod).

[15]  Tracey Ho,et al.  On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[16]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.

[17]  John C. S. Lui,et al.  On the Access Pricing and Network Scaling Issues of Wireless Mesh Networks , 2007, IEEE Transactions on Computers.

[18]  Hari Balakrishnan,et al.  Improving loss resilience with multi-radio diversity in wireless networks , 2005, MobiCom '05.

[19]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.

[20]  Sachin Katti,et al.  The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments , 2005 .

[21]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[22]  Muriel Medard,et al.  On Randomized Network Coding , 2003 .

[23]  Christos Gkantsidis,et al.  Multipath code casting for wireless mesh networks , 2007, CoNEXT '07.

[24]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.