Secure Network Coding for Wireless Mesh Networks
Cristina Nita-Rotaru - Purdue University
Aug 25, 2010Size: 443.7MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractIn this talk we identify two general frameworks (inter-flow and intra-flow) that encompass
several network coding-based systems proposed in wireless mesh networks. Our systematic
analysis of the components of these frameworks reveals vulnerabilities to a wide range of attacks,
which may severely degrade system performance. We then focus on addressing the most severe
and generic attack against network coding systems, known as packet pollution attack. We show
that existing cryptographic mechanisms that were proposed to solve the problem have a prohibitive
cost that makes them impractical in wireless mesh networks. We propose the first practical defense
mechanisms to pollution attacks in network coding for wireless mesh networks. The experimental
results show that the proposed mechanisms can effectively filter out polluted packets and quickly
identify and isolate attacker nodes while incurring small computation and bandwidth overhead.
About the SpeakerCristina Nita-Rotaru is an Associate Professor in the Department of Computer Science at Purdue University where she established the Dependable and Secure Distributed Systems Laboratory (DS2).
She is a member of the Center for Education and Research in Information Assurance and Security (CERIAS) and is associated with the Center for Wireless Systems and Applications (CWSA) at Purdue University.
Her research interests lie in designing distributed systems, network protocols and applications that are robust to failure, mis-configuration, and malicious attacks. Cristina Nita-Rotaru is a recipient of the NSF Career Award in 2006. She has served on the Technical Program Committee of numerous conferences in security, networking, and distributed systems. She is currently serving as an Associate Editor for ACM Transactions on Information Security and Elsevier Computer Communications.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.