ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Avoiding Pollution Attacks in Network Coding using Authentication Code?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 6)

Publication Date:

Authors : ;

Page : 239-243

Keywords : Network coding; Pollution attacks; Authentication code; Authentication key generation;

Source : Downloadexternal Find it from : Google Scholarexternal


When packets are transferred they suffer from the different pollution attacks by injecting malicious packets in the network. When pollution attacks occurs that provides greater damage in the network routing. In this paper, we address this issue by designing a secure authentication code that is computed by using different key generation functions and the key is distributed to the intermediate nodes and to the destinations. The proposed scheme allows verifying the integrity of receiving packets not only at destination nodes, but also at intermediate nodes. The packets which fail the verification those are detected and discarded by considering they are malicious packets or polluted packets in the network. In this way, the pollution in the network is removed before packets reaching to the destinations. This will reduce the pollution attacks from the outsiders and increase the throughput and performance of the data transmission in the coding based network.

Last modified: 2013-06-28 03:35:23