Please use this identifier to cite or link to this item:
https://repository.cihe.edu.hk/jspui/handle/cihe/2374
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chiu, Dah Ming | en_US |
dc.contributor.other | Li, Q. | - |
dc.contributor.other | Lui, J. C. S. | - |
dc.date.accessioned | 2022-02-21T09:48:55Z | - |
dc.date.available | 2022-02-21T09:48:55Z | - |
dc.date.issued | 2006 | - |
dc.identifier.uri | https://repository.cihe.edu.hk/jspui/handle/cihe/2374 | - |
dc.description.abstract | File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers can inject "faked" packets into the file distribution process to slow down the information dispersal or even deplete the network resource. Therefore, content verification is an important and practical issue when network coding is employed. When network coding is used, it is infeasible for the source of the content to provide all the hash values or signatures required for verification, and hence the traditional "hash-and-sign" methods are no longer applicable. Recently, a new on-the-fly verification technique is proposed by Krohn et al. for rateless erasure codes. However, their scheme requires a large number of hash values to be distributed in advance, and all of them are needed to verify even for a single packet. We propose a new batch delivery and verification scheme that is similar to the classical scenario where the authentication information of a message is embedded with the message and is sufficient for the verification purpose. We investigate how our technique can be applied when random linear network coding is employed, and show that both the computational and the bandwidth overhead can be greatly reduced by using a variant of the random network coding. We further show by simulation that this variant is sufficiently effective in practice. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.title | On the practical and security issues of batch content distribution via network coding | en_US |
dc.type | conference proceedings | en_US |
dc.relation.publication | Proceedings of the 2006 IEEE International Conference on Network Protocols (ICNP) | en_US |
dc.identifier.doi | 10.1109/ICNP.2006.320209 | - |
dc.contributor.affiliation | Felizberta Lo Padilla Tong School of Social Sciences | en_US |
dc.relation.isbn | 9781424405930 | en_US |
dc.description.startpage | 158 | en_US |
dc.description.endpage | 167 | en_US |
dc.cihe.affiliated | No | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
item.openairetype | conference proceedings | - |
item.grantfulltext | none | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | Felizberta Lo Padilla Tong School of Social Sciences | - |
crisitem.author.orcid | 0000-0003-0566-5223 | - |
Appears in Collections: | SS Publication |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.