On the robustness of three classes of rateless codes against pollution attacks in P2P networks
Uloženo v:
| Název: | On the robustness of three classes of rateless codes against pollution attacks in P2P networks |
|---|---|
| Autoři: | Gaeta, Rossano, Grangetto, Marco |
| Přispěvatelé: | Gaeta, Rossano, Grangetto, Marco |
| Rok vydání: | 2021 |
| Sbírka: | Università degli studi di Torino: AperTo (Archivio Istituzionale ad Accesso Aperto) |
| Témata: | Rateless code, Random linear code, LT code, Band code, Data modification attack, Pollution attack |
| Popis: | Rateless codes (a.k.a. fountain codes, digital fountain) have found their way in numerous peer-to-peer based applications although their robustness to the so called pollution attack has not been deeply investigated because they have been originally devised as a solution for dealing with block erasures and not for block modification. In this paper we provide an analysis of the intrinsic robustness of three rateless codes algorithms, i.e., random linear network codes (RLNC), Luby transform (LT), and band codes (BC) against intentional data modification. By intrinsic robustness we mean the ability of detecting as soon as possible that modification of at least one equation has occurred as well as the possibility a receiver can decode from the set of equations with and without the modified ones. We focus on bare rateless codes where no additional information is added to equations (e.g., tags) or higher level protocol are used (e.g., verification keys to pre-distribute to receivers) to detect and recover from data modification. We consider several scenarios that combine both random and targeted selection of equations to alter and modification of an equation that can either change the rank of the coding matrix or not. Our analysis reveals that a high percentage of attacks goes undetected unless a minimum code redundancy is achieved, LT codes are the most fragile in virtually all scenarios, RLNC and BC are quite insensitive to the victim selection and type of alteration of chosen equations and exhibit virtually identical robustness although BC offer a low complexity of the decoding algorithm. |
| Druh dokumentu: | article in journal/newspaper |
| Jazyk: | English |
| Relation: | info:eu-repo/semantics/altIdentifier/wos/WOS:000665693700001; volume:14; issue:6; firstpage:3595; lastpage:3604; numberofpages:10; journal:PEER-TO-PEER NETWORKING AND APPLICATIONS; https://hdl.handle.net/2318/1811400; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85117630034 |
| DOI: | 10.1007/s12083-021-01206-2 |
| Dostupnost: | https://hdl.handle.net/2318/1811400 https://doi.org/10.1007/s12083-021-01206-2 |
| Rights: | info:eu-repo/semantics/openAccess |
| Přístupové číslo: | edsbas.E62018F6 |
| Databáze: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://hdl.handle.net/2318/1811400# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Gaeta%20R Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.E62018F6 RelevancyScore: 919 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 918.9462890625 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: On the robustness of three classes of rateless codes against pollution attacks in P2P networks – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Gaeta%2C+Rossano%22">Gaeta, Rossano</searchLink><br /><searchLink fieldCode="AR" term="%22Grangetto%2C+Marco%22">Grangetto, Marco</searchLink> – Name: Author Label: Contributors Group: Au Data: Gaeta, Rossano<br />Grangetto, Marco – Name: DatePubCY Label: Publication Year Group: Date Data: 2021 – Name: Subset Label: Collection Group: HoldingsInfo Data: Università degli studi di Torino: AperTo (Archivio Istituzionale ad Accesso Aperto) – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22Rateless+code%22">Rateless code</searchLink><br /><searchLink fieldCode="DE" term="%22Random+linear+code%22">Random linear code</searchLink><br /><searchLink fieldCode="DE" term="%22LT+code%22">LT code</searchLink><br /><searchLink fieldCode="DE" term="%22Band+code%22">Band code</searchLink><br /><searchLink fieldCode="DE" term="%22Data+modification+attack%22">Data modification attack</searchLink><br /><searchLink fieldCode="DE" term="%22Pollution+attack%22">Pollution attack</searchLink> – Name: Abstract Label: Description Group: Ab Data: Rateless codes (a.k.a. fountain codes, digital fountain) have found their way in numerous peer-to-peer based applications although their robustness to the so called pollution attack has not been deeply investigated because they have been originally devised as a solution for dealing with block erasures and not for block modification. In this paper we provide an analysis of the intrinsic robustness of three rateless codes algorithms, i.e., random linear network codes (RLNC), Luby transform (LT), and band codes (BC) against intentional data modification. By intrinsic robustness we mean the ability of detecting as soon as possible that modification of at least one equation has occurred as well as the possibility a receiver can decode from the set of equations with and without the modified ones. We focus on bare rateless codes where no additional information is added to equations (e.g., tags) or higher level protocol are used (e.g., verification keys to pre-distribute to receivers) to detect and recover from data modification. We consider several scenarios that combine both random and targeted selection of equations to alter and modification of an equation that can either change the rank of the coding matrix or not. Our analysis reveals that a high percentage of attacks goes undetected unless a minimum code redundancy is achieved, LT codes are the most fragile in virtually all scenarios, RLNC and BC are quite insensitive to the victim selection and type of alteration of chosen equations and exhibit virtually identical robustness although BC offer a low complexity of the decoding algorithm. – Name: TypeDocument Label: Document Type Group: TypDoc Data: article in journal/newspaper – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: info:eu-repo/semantics/altIdentifier/wos/WOS:000665693700001; volume:14; issue:6; firstpage:3595; lastpage:3604; numberofpages:10; journal:PEER-TO-PEER NETWORKING AND APPLICATIONS; https://hdl.handle.net/2318/1811400; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85117630034 – Name: DOI Label: DOI Group: ID Data: 10.1007/s12083-021-01206-2 – Name: URL Label: Availability Group: URL Data: https://hdl.handle.net/2318/1811400<br />https://doi.org/10.1007/s12083-021-01206-2 – Name: Copyright Label: Rights Group: Cpyrght Data: info:eu-repo/semantics/openAccess – Name: AN Label: Accession Number Group: ID Data: edsbas.E62018F6 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.E62018F6 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1007/s12083-021-01206-2 Languages: – Text: English Subjects: – SubjectFull: Rateless code Type: general – SubjectFull: Random linear code Type: general – SubjectFull: LT code Type: general – SubjectFull: Band code Type: general – SubjectFull: Data modification attack Type: general – SubjectFull: Pollution attack Type: general Titles: – TitleFull: On the robustness of three classes of rateless codes against pollution attacks in P2P networks Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Gaeta, Rossano – PersonEntity: Name: NameFull: Grangetto, Marco – PersonEntity: Name: NameFull: Gaeta, Rossano – PersonEntity: Name: NameFull: Grangetto, Marco IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2021 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa |
| ResultId | 1 |
Nájsť tento článok vo Web of Science