An Efficient Dynamic TESLA based Authentication Scheme for Secure Network Coding
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 6
Abstract
Network coding based applications are notoriously susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. However, existing packets authentication scheme i. e. the Times keys scheme consumes extra bandwidth for transmission of times keys. Also the Time keys can be captured and replay attack can be launched by the attacker. This motivates to design a new solution to avoid the problems in Time keys scheme. The solution is based on the concept that the source and the destination must agree on the keys along with the network coding process. This scheme of agreeing on the keys is known as adaptive TESLA scheme. Using this proposed scheme the effect of pollution attack and collusion attack is measured in terms of real packets corrupted and dropped. The proposed adaptive TESLA scheme for network coding is also compared with times keys in terms of bandwidth usages.
Authors and Affiliations
Aparna Jumde
LONELINESS IS A DISEASE
Feeling of loneliness and being alone were found to be independent predictors of motor decline in old age.[33.[34] It also leads to memory impairment and learning difficulties, and makes the person prone to Alzheimer's d...
An Experimental Study on Impact of Visuals in e-Learning Content of Art and Media
Visuals and e-Content growth become an inseparable from the human society today. Every day we engaged with conversations, most of the times e-Visuals help us to solve the issues to learn and understand better. This study...
Social Security Challenges and Human Development in India
Social security has always been an important instrument for securing social and economic justice in a country. India being a primarily developing country with a vast population requiring a boost from the government, the...
Error Free Cryptographic Secure Communication Using LDPC and Stopping Set Algorithm
In this paper we discuss how LDPC and Stopping set can be used in communication system design. In cryptographic secure communication we are transmitting data securely. LDPC algorithm implemented at sender side and stoppi...
Academic Recommendation
The proposed work is intended to develop a semi-automatic technique for classifying the sentiments based text. Basically in this presented work for text classification the decision trees are implemented which are the sup...