Toward secure network coding in wireless networks: Threats and challenges

Jing Dong, Reza Curtmola, Ruben Sethi, Cristina Nita-Rotaru

Research output: Chapter in Book/Report/Conference proceedingConference contribution

36 Scopus citations

Abstract

In recent years, network coding has emerged as a new communication paradigm that can significantly improve the efficiency of network protocols by requiring intermediate nodes to mix packets before forwarding them. Recently, several real-world systems have been proposed to leverage network coding in wireless networks. Although the theoretical foundations of network coding are well understood, a real-world system needs to solve a plethora of practical aspects before network coding can meet its promised potential. These practical design choices expose network coding systems to a wide range of attacks. In this paper, we identify two general frameworks that encompass several network coding-based systems proposed for unicast in wireless networks. Our systematic analysis of the components of these frameworks reveals vulnerabilities to a wide range of attacks, which may severely degrade system performance. Adequate understanding of these threats is essential to effectively design secure practical network coding systems.

Original languageEnglish (US)
Title of host publication4th IEEE Workshop on Secure Network Protocols, NPSec'08
Pages33-38
Number of pages6
DOIs
StatePublished - 2008
Externally publishedYes
Event4th IEEE Workshop on Secure Network Protocols, NPSec'08 - Orlando, FL, United States
Duration: Oct 19 2008Oct 19 2008

Publication series

Name4th IEEE Workshop on Secure Network Protocols, NPSec'08

Other

Other4th IEEE Workshop on Secure Network Protocols, NPSec'08
Country/TerritoryUnited States
CityOrlando, FL
Period10/19/0810/19/08

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Toward secure network coding in wireless networks: Threats and challenges'. Together they form a unique fingerprint.

Cite this