Attack Detection Using Network Coding in IoT Environment
Network coding is a reasonable way to increase network efficiency in response to an increase of sensed data in the Internet of Things (IoT). In network coding, intermediate nodes combine packets received from neighboring nodes, transform, and transmit encoded packets that can be decoded at the desti...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-02-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/20/4/1180 |
id |
doaj-87144988252045fa816fd643124ae821 |
---|---|
record_format |
Article |
spelling |
doaj-87144988252045fa816fd643124ae8212020-11-25T02:56:04ZengMDPI AGSensors1424-82202020-02-01204118010.3390/s20041180s20041180Attack Detection Using Network Coding in IoT EnvironmentYong Lee0Goo Yeon Lee1Independent Researcher, Chuncheon 24341, KoreaDepartment of Computer and Communications Engineering, Kangwon National University, Chuncheon 24341, KoreaNetwork coding is a reasonable way to increase network efficiency in response to an increase of sensed data in the Internet of Things (IoT). In network coding, intermediate nodes combine packets received from neighboring nodes, transform, and transmit encoded packets that can be decoded at the destination. This scheme is based on trust among nodes. If any malicious node joins the network, it can act as an intermediate node that could fabricate encoded packets. It might be more difficult to identify the authenticity of such encoded packets since packets that are received at the destination might not originate from a single source, but be combined with several other packets originating from multiple sources. In this paper, we propose a scheme on how to detect attacked packets among the received packets at a destination and how to recover the original message from the packets including the attacked <i>“look-like-valid”</i> packets. This scheme shows that a destination could recover the valid message with just the received packets including some attacked packets and will result in a quite efficient performance in network coding.https://www.mdpi.com/1424-8220/20/4/1180internet of thingsnetwork codingattack detectionrecovery |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yong Lee Goo Yeon Lee |
spellingShingle |
Yong Lee Goo Yeon Lee Attack Detection Using Network Coding in IoT Environment Sensors internet of things network coding attack detection recovery |
author_facet |
Yong Lee Goo Yeon Lee |
author_sort |
Yong Lee |
title |
Attack Detection Using Network Coding in IoT Environment |
title_short |
Attack Detection Using Network Coding in IoT Environment |
title_full |
Attack Detection Using Network Coding in IoT Environment |
title_fullStr |
Attack Detection Using Network Coding in IoT Environment |
title_full_unstemmed |
Attack Detection Using Network Coding in IoT Environment |
title_sort |
attack detection using network coding in iot environment |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2020-02-01 |
description |
Network coding is a reasonable way to increase network efficiency in response to an increase of sensed data in the Internet of Things (IoT). In network coding, intermediate nodes combine packets received from neighboring nodes, transform, and transmit encoded packets that can be decoded at the destination. This scheme is based on trust among nodes. If any malicious node joins the network, it can act as an intermediate node that could fabricate encoded packets. It might be more difficult to identify the authenticity of such encoded packets since packets that are received at the destination might not originate from a single source, but be combined with several other packets originating from multiple sources. In this paper, we propose a scheme on how to detect attacked packets among the received packets at a destination and how to recover the original message from the packets including the attacked <i>“look-like-valid”</i> packets. This scheme shows that a destination could recover the valid message with just the received packets including some attacked packets and will result in a quite efficient performance in network coding. |
topic |
internet of things network coding attack detection recovery |
url |
https://www.mdpi.com/1424-8220/20/4/1180 |
work_keys_str_mv |
AT yonglee attackdetectionusingnetworkcodinginiotenvironment AT gooyeonlee attackdetectionusingnetworkcodinginiotenvironment |
_version_ |
1724714348675334144 |