Prevention of Pollution Attacks and DoS Attack in Network Coding Using Node Identity Verification Scheme

Download Now
Provided by: IJAIR
Topic: Security
Format: PDF
In recent years, the information maintenance is very difficult. Some attacks may occur on the local system or network based systems. Without security measures and controls in place, the people data might be subjected to an attack. Now-a-days several attacks are evolved. The most common method of attack involves sending enormous amount of request to server or website and server will be unable to handle the requests and website will be offline for few days or it may take years depends upon the attack. In this paper, the authors introduced a novel homomorphic MAC scheme called SpaceMac, which allows an intermediate node to verify whether received packets belong to a specific subspace, even if the subspace is expanding over time.
Download Now

Find By Topic