Academic Journals Database
Disseminating quality controlled scientific knowledge

Avoiding Pollution Attacks in Network Coding using Authentication Code

Author(s): Mangesh N. Bhandare | Ravindra C. Thool | Gurdeep Singh Wahi

Journal: International Journal of Computer Science and Mobile Computing
ISSN 2320-088X

Volume: 2;
Issue: 6;
Start page: 239;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Network coding | Pollution attacks | Authentication code | Authentication key generation

When packets are transferred they suffer from the different pollution attacks by injectingmalicious packets in the network. When pollution attacks occurs that provides greater damage in the networkrouting. In this paper, we address this issue by designing a secure authentication code that is computed byusing different key generation functions and the key is distributed to the intermediate nodes and to thedestinations. The proposed scheme allows verifying the integrity of receiving packets not only at destinationnodes, but also at intermediate nodes. The packets which fail the verification those are detected and discardedby considering they are malicious packets or polluted packets in the network. In this way, the pollution in thenetwork is removed before packets reaching to the destinations. This will reduce the pollution attacks fromthe outsiders and increase the throughput and performance of the data transmission in the coding basednetwork.
Why do you need a reservation system?      Affiliate Program