Avoiding Pollution Attacks in Network Coding using Authentication Code?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 6)Publication Date: 2013-06-30
Authors : Mangesh N. Bhandare Ravindra C. Thool Gurdeep Singh Wahi;
Page : 239-243
Keywords : Network coding; Pollution attacks; Authentication code; Authentication key generation;
Abstract
When packets are transferred they suffer from the different pollution attacks by injecting malicious packets in the network. When pollution attacks occurs that provides greater damage in the network routing. In this paper, we address this issue by designing a secure authentication code that is computed by using different key generation functions and the key is distributed to the intermediate nodes and to the destinations. The proposed scheme allows verifying the integrity of receiving packets not only at destination nodes, but also at intermediate nodes. The packets which fail the verification those are detected and discarded by considering they are malicious packets or polluted packets in the network. In this way, the pollution in the network is removed before packets reaching to the destinations. This will reduce the pollution attacks from the outsiders and increase the throughput and performance of the data transmission in the coding based network.
Other Latest Articles
- An Overview of Speech Recognition Using HMM?
- Using Maple to Evaluate the Partial Derivatives of Two-Variables Functions?
- Comparison of ANNs, Fuzzy Logic and Neuro-Fuzzy Integrated Approach for Diagnosis of Coronary Heart Disease: A Survey
- A Novel Steganographic Approach for Enhancing the Security of Images
- Rule-Based and Cluster-Based Intrusion Detection Technique for Wireless Sensor Network?
Last modified: 2013-06-28 03:35:23