Improved Performance Approach for P2P Networks with Network Coding
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 6)Publication Date: 2014-06-15
Authors : Aparna Jumde; Shyamsundar Gupta;
Page : 456-459
Keywords : Network Coding; Pollution attack; Collusion attack; TESLA; P2P Network;
Abstract
Network coding based applications are reprehensibly susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. However, existing packets authentication scheme i.e. Times keys scheme utilizes extra bandwidth for transmission of times keys. Bu tin this scheme replay attack can be launched by capturing the Time keys by the attacker, and attacker can introduce a malicious packet in network. As to save bandwidth we are using network coding this attack may get prorogated throughout the network and result into pollution attack. The solution to avoid the problems in Time keys scheme is based on the concept that the source and the destination must agree on the keys along with the network coding process. This scheme of agreeing on the keys is known as adaptive TESLA scheme. Using this proposed scheme the effect of pollution attack and collusion attack is measured in terms of real packets corrupted and dropped. The proposed TESLA scheme for network coding is also compared with times keys in terms of bandwidth usages.
Other Latest Articles
- Security of Information Using Cryptography and Image Processing
- Efficient, Least Cost, Energy-Aware (ELCEA) Quality of Service Protocol in Wireless Sensor Networks
- SINR and RSSI Based Optimized AODV Routing Protocol for MANET using Cross Layer Interaction
- Past of Africa: A Legacy to Present and Future
- Monoamine Oxidase Inhibitory and Anticonvulsant Activities of Some Substituted Isatin Semicarbazones
Last modified: 2014-06-23 19:45:00