Energy Efficient Authentication Strategies for Network Coding
New techniques have emerged in information theory to improve the dissemination of information over a network. Many of these new results, e.g. data aggregation or network coding, can be used to increase the throughput or to preserve the energy. Other paradigms like rate-less codes (fountain codes) improve the resiliency of the transmission to packet losses. Many of these transformations have in common that the data exchanged by the nodes are some linear combinations of the data to be transmitted. The consequence is that it is more difficult for the relaying nodes to know whether a received data is legitimate. There is an opportunity for an adversary to inject his own data. Such an attack is called a pollution attack.