International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 133 | Views: 269 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014 | Popularity: 7 / 10


     

Improved Performance Approach for P2P Networks with Network Coding

Aparna Jumde, Shyamsundar Gupta


Abstract: Network coding based applications are reprehensibly susceptible to malicious pollution attacks. Packets authentication schemes have been well-recognized as the most effective approach to address this security threat. However; existing packets authentication scheme i. e. Times keys scheme utilizes extra bandwidth for transmission of times keys. Bu tin this scheme replay attack can be launched by capturing the Time keys by the attacker; and attacker can introduce a malicious packet in network. As to save bandwidth we are using network coding this attack may get prorogated throughout the network and result into pollution attack. The solution to avoid the problems in Time keys scheme is based on the concept that the source and the destination must agree on the keys along with the network coding process. This scheme of agreeing on the keys is known as adaptive TESLA scheme. Using this proposed scheme the effect of pollution attack and collusion attack is measured in terms of real packets corrupted and dropped. The proposed TESLA scheme for network coding is also compared with times keys in terms of bandwidth usages.


Keywords: Network Coding, Pollution attack, Collusion attack, TESLA, P2P Network


Edition: Volume 3 Issue 6, June 2014


Pages: 456 - 459



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Aparna Jumde, Shyamsundar Gupta, "Improved Performance Approach for P2P Networks with Network Coding", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June 2014, pp. 456-459, https://www.ijsr.net/getabstract.php?paperid=2014178, DOI: https://www.doi.org/10.21275/2014178



Similar Articles

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 102

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2371 - 2374

Survey on Data Aggregation Technique for Wireless Sensor Networks based on IF algorithm

Anagha Jagtap, M. D. Ingle

Share this Article

Downloads: 109

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2062 - 2066

Load Balancing in P2P Networks using Random Walk Algorithm

A. S. Syed Navaz, A. S. Syed Fiaz

Share this Article

Downloads: 111 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2374 - 2378

Analysis and Implementation of Peer to Peer Live Video Streaming System

Lekshmy A Sasi, Minu Lalitha Madhavu

Share this Article

Downloads: 117

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1052 - 1055

Efficient Approximate Processing of Queries in P2P Networks

Suraj N. Arya, Rajesh V. Argiddi

Share this Article
Top