Published November 2009
| Published
Book Section - Chapter
Open
On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack
- Creators
- Vyetrenko, Svitlana
- Khosla, Aditya
- Ho, Tracey
Chicago
Abstract
In this paper we consider the pollution attack in network coded systems where network nodes are computationally limited. We consider the combined use of cryptographic signature based security and information theoretic network error correction and propose a fountain-like network error correction code construction suitable for this purpose.
Additional Information
© 2009 IEEE. This work was partly funded by subcontract 069153 issued by BAE Systems National Security Solutions, Inc. and supported by the Defense Advanced Research Projects Agency (DARPA) and the Space and Naval Warfare System Center (SPAWARSYSCEN), San Diego under Contract No. N66001-08-C-2013, and by Caltech's Lee Center for Advanced Networking. Part of this work was done while Aditya Khosla was at Caltech.Attached Files
Published - 05469966.pdf
Files
05469966.pdf
Files
(195.6 kB)
Name | Size | Download all |
---|---|---|
md5:52c75d439580d7b7d99aafb8fc540b7f
|
195.6 kB | Preview Download |
Additional details
- Eprint ID
- 75496
- Resolver ID
- CaltechAUTHORS:20170328-174035672
- BAE Systems National Security Solutions, Inc.
- 069153
- Defense Advanced Research Projects Agency (DARPA)
- Space and Naval Warfare System Center (SPAWARSYSCEN)
- N66001-08-C-2013
- Caltech Lee Center for Advanced Networking
- Created
-
2017-03-29Created from EPrint's datestamp field
- Updated
-
2021-11-15Created from EPrint's last_modified field