Title :
A Survey of Security Network Coding toward Various Attacks
Author :
Shixiong Yao ; Jing Chen ; Ruiying Du ; Lan Deng ; Chiheng Wang
Author_Institution :
Dept. of Comput. Sci., Wuhan Univ., Wuhan, China
Abstract :
As one of the emerging technologies with most potential for developing, Network Coding (NC) has gained significant momentum. Due to encode-and-forward model, NC has natural privacy in communication, but it also induces that attackers become more imperceptible and impact on NC caused by them becomes more far-reaching. This requires that the security schemes should consider the characteristics of different attacks in NC. In this paper, we provide a survey of secure network coding toward various attacks. First of all, we summarize four types of representative attacks in NC system including entropy attack, Byzantine attack, pollution attack and eavesdropping attack, and compare the differences of these attacks between in traditional store-and-forward mode and network coding mode. Secondly, we give a comprehensive investigation of numerous defense approaches and mechanisms classified by these attacks. Finally, for stimulating stream of thoughts about secure network coding schemes, several open issues are proposed and discussed.
Keywords :
network coding; telecommunication security; Byzantine attack; NC; eavesdropping attack; encode-and-forward model; entropy attack; network coding mode; network coding security; pollution attack; store-and-forward mode; Cryptography; Encoding; Entropy; Network coding; Pollution; Vectors; Network coding; defense schemes; four forms of attacks;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
Conference_Location :
Beijing
DOI :
10.1109/TrustCom.2014.35