Networking

On the Security and Efficiency of Content Distribution via Network Coding

Download Now Free registration required

Executive Summary

Content distribution via network coding has received a lot of attention lately. However, direct application of network coding may be insecure. In particular, attackers can inject "Bogus" data to corrupt the content distribution process so as to hinder the information dispersal or even deplete the network resource. Therefore, content verification is an important and practical issue when network coding is employed. When random linear network coding is used, it is infeasible for the source of the content to sign all the data, and hence the traditional "Hash-and-sign" methods are no longer applicable.

  • Format: PDF
  • Size: 251.79 KB