Provided by: Creative Commons
Date Added: Jun 2015
Network coding based applications are notoriously susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. However, existing packets authentication scheme i.e. the Times keys scheme consumes extra bandwidth for transmission of times keys. Also the time keys can be captured and replay attack can be launched by the attacker. This motivates to design a new solution to avoid the problems in time keys scheme. The solution is based on the concept that the source and the destination must agree on the keys along with the network coding process.