A Survey of Security Network Coding toward Various Attacks

TrustCom(2014)

引用 20|浏览47
暂无评分
摘要
As one of the emerging technologies with most potential for developing, Network Coding (NC) has gained significant momentum. Due to encode-and-forward model, NC has natural privacy in communication, but it also induces that attackers become more imperceptible and impact on NC caused by them becomes more far-reaching. This requires that the security schemes should consider the characteristics of different attacks in NC. In this paper, we provide a survey of secure network coding toward various attacks. First of all, we summarize four types of representative attacks in NC system including entropy attack, Byzantine attack, pollution attack and eavesdropping attack, and compare the differences of these attacks between in traditional store-and-forward mode and network coding mode. Secondly, we give a comprehensive investigation of numerous defense approaches and mechanisms classified by these attacks. Finally, for stimulating stream of thoughts about secure network coding schemes, several open issues are proposed and discussed.
更多
查看译文
关键词
nc,eavesdropping attack,encode-and-forward model,pollution attack,entropy attack,network coding, four forms of attacks, defense schemes,network coding security,byzantine attack,network coding mode,telecommunication security,four forms of attacks,store-and-forward mode,network coding,defense schemes,entropy,pollution,vectors,cryptography,encoding
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要