An Efficient Dynamic TESLA based Authentication Scheme for Secure Network Coding

Abstract

Network coding based applications are notoriously susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. However, existing packets authentication scheme i. e. the Times keys scheme consumes extra bandwidth for transmission of times keys. Also the Time keys can be captured and replay attack can be launched by the attacker. This motivates to design a new solution to avoid the problems in Time keys scheme. The solution is based on the concept that the source and the destination must agree on the keys along with the network coding process. This scheme of agreeing on the keys is known as adaptive TESLA scheme. Using this proposed scheme the effect of pollution attack and collusion attack is measured in terms of real packets corrupted and dropped. The proposed adaptive TESLA scheme for network coding is also compared with times keys in terms of bandwidth usages.

Authors and Affiliations

Aparna Jumde

Keywords

Related Articles

Wavelet Based Image Compression

Images require substantial storage and transmission resources, thus image compression is advantageous to reduce these requirements. Image compression is a key technology in transmission and storage of digital images beca...

Network Security Cryptographic Protocols and Lattice Problems

We present a new protocol for electronic cash which is designed to function on hardware with limited computing power. The scheme has provable security properties and low computational requirements, but it still gives a f...

Feature Selection using Clustering Algorithms: FAST and LUFS

Feature selection is used to reduce the number of features in many applications where hundreds or thousands of features are present in data. Many feature selection methods are proposed which mainly focus on finding relev...

Grey Wolf Optimization Algorithm for Colour Image Enhancement Considering Brightness Preservation Constraint

Colour image enhancement plays an important role in Digital Image Processing. Color images provide more and better off information for visual perception than that of the gray images. The purpose of image enhancement is t...

Security Issues in Cloud Computing

Sharing of resources like processing, data, services etc. through a web based delivery system constitutes the concept of a cloud based computing normally. The supplier presents all its resources via the web which may be...

Download PDF file
  • EP ID EP241043
  • DOI -
  • Views 118
  • Downloads 0

How To Cite

Aparna Jumde (2015). An Efficient Dynamic TESLA based Authentication Scheme for Secure Network Coding. International journal of Emerging Trends in Science and Technology, 2(6), 2753-2758. https://europub.co.uk/articles/-A-241043