首页> 外文期刊>Mobile Computing, IEEE Transactions on >Exploiting Rateless Codes and Belief Propagation to Infer Identity of Polluters in MANET
【24h】

Exploiting Rateless Codes and Belief Propagation to Infer Identity of Polluters in MANET

机译:利用无速率代码和信念传播推断MANET中的污染者身份

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper, we consider a scenario where nodes in a MANET disseminate data chunks using rateless codes. Any node is able to successfully decode any chunk by collecting enough coded blocks from several other nodes without any coordination. We consider the problem of identifying malicious nodes that launch a pollution attack by deliberately modifying the payload of coded blocks before transmitting. It follows that the original chunk can only be obtained if there are no malicious nodes among the chunk providers. In this paper we propose SIEVE, a fully distributed technique to infer the identity of malicious nodes. A node creates what we termed a check whenever a chunk is decoded; a check is a pair composed of the set of other nodes that provided coded blocks used to decode the chunk (the chunk uploaders) and a flag indicating whether the chunk is corrupted or not. SIEVE exploits rateless codes to detect chunk integrity and belief propagation to infer the identity of malicious nodes. In particular, every node autonomously constructs its own bipartite graph (a.k.a. factor graph in the literature) whose vertexes are checks and nodes, respectively. Then, it periodically runs the belief propagation algorithm on its factor graph to infer the probability of other nodes being malicious. We show by running detailed simulations using ns-3 that SIEVE is very accurate and robust under several attack scenarios and deceiving actions. We discuss how the topological properties of the factor graph impacts SIEVE performance and show that nodes speed in the MANET plays a role on the identification accuracy. Furthermore, an interesting trade-off between coding efficiency and SIEVE accuracy, completeness, and reactivity is discovered. We also show that SIEVE is efficient requiring low computational, memory, and communication resources.
机译:在本文中,我们考虑了MANET中的节点使用无速率代码分发数据块的情况。任何节点都可以通过从其他几个节点收集足够的编码块而无需任何协调来成功解码任何块。我们考虑通过在传输之前故意修改编码块的有效载荷来识别发动污染攻击的恶意节点的问题。因此,只有在块提供者之间没有恶意节点的情况下,才能获取原始块。在本文中,我们提出了SIEVE,这是一种完全分布式的技术,可以推断恶意节点的身份。每当解码块时,节点都会创建我们所谓的检查。支票是一对由其他节点组成的对,这些节点提供了用于解码块的编码块(块上载器)和一个标志,指示块是否损坏。 SIEVE利用无速率代码来检测块完整性和置信度传播,以推断出恶意节点的身份。特别是,每个节点自主构造其自己的二部图(文献中也称为因子图),其顶点分别为校验和节点。然后,它定期在其因子图上运行置信传播算法,以推断其他节点被恶意攻击的可能性。通过使用ns-3运行详细的仿真,我们可以证明SIEVE在几种攻击情形和欺骗行为下非常准确且可靠。我们讨论了因子图的拓扑属性如何影响SIEVE性能,并表明MANET中的节点速度对识别精度起着作用。此外,发现了编码效率与SIEVE准确性,完整性和反应性之间的有趣折衷。我们还表明,SIEVE是高效的,需要较少的计算,内存和通信资源。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号