Preventing the success of active attacks is of essential importance for network coding since even the infiltration of one single corrupted data packet can jam large parts of the network. The existing approaches for network coding schemes preventing such pollution attacks can be divided into two categories: utilize cryptographic approaches or utilize redundancy similar to error correction coding. Within this paper, we compared both paradigms concerning efficiency of data transmission under various circumstances. Particularly, we considered an attacker of a certain strength as well as the influence of the generation size. The results are helpful for selecting a suitable approach for network coding taking into account both security against pollution attacks and efficiency.
Identifer | oai:union.ndltd.org:DRESDEN/oai:qucosa.de:bsz:14-qucosa-145096 |
Date | 07 July 2014 |
Creators | Pfennig, Stefan, Franz, Elke |
Contributors | Technische Universität Dresden, Sonderforschungsbereich 912 |
Publisher | Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden |
Source Sets | Hochschulschriftenserver (HSSS) der SLUB Dresden |
Language | English |
Detected Language | English |
Type | doc-type:conferenceObject |
Format | application/pdf |
Source | IEEE 18th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2013, Berlin, Germany, September 25-27, 2013, pp. 18 - 22 |
Page generated in 0.002 seconds