Attack Detection Using Network Coding in IoT Environment

Network coding is a reasonable way to increase network efficiency in response to an increase of sensed data in the Internet of Things (IoT). In network coding, intermediate nodes combine packets received from neighboring nodes, transform, and transmit encoded packets that can be decoded at the desti...

Full description

Bibliographic Details
Main Authors: Yong Lee, Goo Yeon Lee
Format: Article
Language:English
Published: MDPI AG 2020-02-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/20/4/1180
id doaj-87144988252045fa816fd643124ae821
record_format Article
spelling doaj-87144988252045fa816fd643124ae8212020-11-25T02:56:04ZengMDPI AGSensors1424-82202020-02-01204118010.3390/s20041180s20041180Attack Detection Using Network Coding in IoT EnvironmentYong Lee0Goo Yeon Lee1Independent Researcher, Chuncheon 24341, KoreaDepartment of Computer and Communications Engineering, Kangwon National University, Chuncheon 24341, KoreaNetwork coding is a reasonable way to increase network efficiency in response to an increase of sensed data in the Internet of Things (IoT). In network coding, intermediate nodes combine packets received from neighboring nodes, transform, and transmit encoded packets that can be decoded at the destination. This scheme is based on trust among nodes. If any malicious node joins the network, it can act as an intermediate node that could fabricate encoded packets. It might be more difficult to identify the authenticity of such encoded packets since packets that are received at the destination might not originate from a single source, but be combined with several other packets originating from multiple sources. In this paper, we propose a scheme on how to detect attacked packets among the received packets at a destination and how to recover the original message from the packets including the attacked <i>&#8220;look-like-valid&#8221;</i> packets. This scheme shows that a destination could recover the valid message with just the received packets including some attacked packets and will result in a quite efficient performance in network coding.https://www.mdpi.com/1424-8220/20/4/1180internet of thingsnetwork codingattack detectionrecovery
collection DOAJ
language English
format Article
sources DOAJ
author Yong Lee
Goo Yeon Lee
spellingShingle Yong Lee
Goo Yeon Lee
Attack Detection Using Network Coding in IoT Environment
Sensors
internet of things
network coding
attack detection
recovery
author_facet Yong Lee
Goo Yeon Lee
author_sort Yong Lee
title Attack Detection Using Network Coding in IoT Environment
title_short Attack Detection Using Network Coding in IoT Environment
title_full Attack Detection Using Network Coding in IoT Environment
title_fullStr Attack Detection Using Network Coding in IoT Environment
title_full_unstemmed Attack Detection Using Network Coding in IoT Environment
title_sort attack detection using network coding in iot environment
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2020-02-01
description Network coding is a reasonable way to increase network efficiency in response to an increase of sensed data in the Internet of Things (IoT). In network coding, intermediate nodes combine packets received from neighboring nodes, transform, and transmit encoded packets that can be decoded at the destination. This scheme is based on trust among nodes. If any malicious node joins the network, it can act as an intermediate node that could fabricate encoded packets. It might be more difficult to identify the authenticity of such encoded packets since packets that are received at the destination might not originate from a single source, but be combined with several other packets originating from multiple sources. In this paper, we propose a scheme on how to detect attacked packets among the received packets at a destination and how to recover the original message from the packets including the attacked <i>&#8220;look-like-valid&#8221;</i> packets. This scheme shows that a destination could recover the valid message with just the received packets including some attacked packets and will result in a quite efficient performance in network coding.
topic internet of things
network coding
attack detection
recovery
url https://www.mdpi.com/1424-8220/20/4/1180
work_keys_str_mv AT yonglee attackdetectionusingnetworkcodinginiotenvironment
AT gooyeonlee attackdetectionusingnetworkcodinginiotenvironment
_version_ 1724714348675334144