An Efficient Dynamic TESLA based Authentication Scheme for Secure Network Coding
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 6
Abstract
Network coding based applications are notoriously susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. However, existing packets authentication scheme i. e. the Times keys scheme consumes extra bandwidth for transmission of times keys. Also the Time keys can be captured and replay attack can be launched by the attacker. This motivates to design a new solution to avoid the problems in Time keys scheme. The solution is based on the concept that the source and the destination must agree on the keys along with the network coding process. This scheme of agreeing on the keys is known as adaptive TESLA scheme. Using this proposed scheme the effect of pollution attack and collusion attack is measured in terms of real packets corrupted and dropped. The proposed adaptive TESLA scheme for network coding is also compared with times keys in terms of bandwidth usages.
Authors and Affiliations
Aparna Jumde
Fusarium Wilt of Garden Egg (Solanum melongena) At Imawa Village of Kura Local Government of Kano State, Nigeria
This was a Survey of fusarium wilt of Solanum melongena at Imawa village of Kura Local Government area located on N11o 47’56.8” and 008o 27’33.7”. During the survey, Four (4) plots were visited weekly for 8 weeks. Sympto...
Madhya Pradesh Public Service Guarantees Act 2010 and Transparency of Administration
India comprises statutory laws which guarantee time bound delivery of services for various public services rendered by the Government to citizen and provides mechanism for punishing the errant public servant who is defic...
Porous Asphat Design for Cold Climate Use
Porous asphalt pavements offer an alternative technology for stormwater management. A porous asphalt pavement differs from traditional asphalt pavement designs in that the structure permits fluids to pass freely through...
Literature Survey on Attribute Based Encryption (ABE)
During this Paper, we tend to show however Anony Control-F extends the User Revocation rule with a data structure to enhance quantify ability and adaptability whereas at a similar time inherits the feature of fine-graine...
Global Development of Mushroom Biotechnology
There are At least 12000 species of fungi that can be considered as mushrooms with at least 2000 species showing various degrees of edibility. To date, only about 35 mushrooms species have been cultivated commercially, a...