2011
DOI: 10.1504/ijsn.2011.043669
|View full text |Cite
|
Sign up to set email alerts
|

A source authentication scheme using network coding

Abstract: In this paper, we explore the security merits of network coding and potential trade-offs with the widely accepted throughput benefits, especially in multicast scenarios. In particular, we propose a novel Source Authentication using Network Coding (SANC) scheme. Towards this objective, we propose a general framework for embedding the authentication information within the network coding Global Encoding Vector. First, we illustrate the proposed concept using a simple mapping function. Second, we present a detaile… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…Now-a-days the usage of the Online Social Networks (OSN) [7] is increased. In OSN, the user begins contacting without meeting each other.…”
Section: Authentication In Social Networkmentioning
confidence: 99%
“…Now-a-days the usage of the Online Social Networks (OSN) [7] is increased. In OSN, the user begins contacting without meeting each other.…”
Section: Authentication In Social Networkmentioning
confidence: 99%
“…The most common attack of NDN network is sending fake information. In order to solve the Interest flooding attack,we provide network coding algorithm combining SANC [15]to ensure that the information from trusted users. Before authentication.…”
Section: Secure Network Codingmentioning
confidence: 99%
“…We find NDN routing adopts interest driven way that is similar to publish/subscribe routing MP2P.We use anonymity technology of based on network coding referencing anonymous protocol of MP2P to design NDN network anonymity protocol. Because there is flooding attack interest in NDN network,we combine SANC [15] with coding scheme for source authentication, and encrypt coding coefficient to improve the ability of resisting collision attack.…”
mentioning
confidence: 99%
“…Meanwhile, with outsourced computation, judging whether the computation is implemented with top-notch integrity may be difficult. Considering that computation details are never transparent enough to the cloud user, cloud servers may act unfaithfully and present misleading computing results; that is, they may fail to adhere to the semi-honest model [108]. For instance, some computations require a large substantial amount of computing resources, which present incentives for the system to be "lazy.…”
Section: Data Breachesmentioning
confidence: 99%