Title :
When Eco-IT meets security: Concealed network coding for multicast traffic
Author :
Hessler, Alban ; Kakumaru, Takahiro ; Westhoff, Dirk
Author_Institution :
NEC Labs. Eur., NEC Eur. Ltd., Heidelberg, Germany
fDate :
March 29 2010-April 2 2010
Abstract :
Network coding techniques such as fountain codes are a promising way to disseminate large bulks of data in a multicast manner over an unreliable medium. In this work we investigate how to conceal such encoded data stream on its way to numerous receivers with a minimum investment. Compared to conventional ´encrypt - encode / decode - decrypt´ approaches, our solution is preferable for two reasons: i) it causes less CPU investment for encryption and decryption up to orders of magnitude; ii) besides hiding the data, we also hide the coding information from an eavesdropper.
Keywords :
computer network security; cryptography; multicast communication; network coding; coding information; concealed network coding; eavesdropper; eco-IT; encoded data stream; less CPU investment; multicast traffic; Cryptography; Data security; Decoding; Encoding; Europe; Information security; Investments; National electric code; Network coding; Telecommunication traffic;
Conference_Titel :
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2010 8th IEEE International Conference on
Conference_Location :
Mannheim
Print_ISBN :
978-1-4244-6605-4
Electronic_ISBN :
978-1-4244-6606-1
DOI :
10.1109/PERCOMW.2010.5470512