ABSTRACT:

Content distribution via network coding has received a lot of attention lately. However, direct application of network coding may be insecure. In particular, attackers can inject "bogus” data to corrupt the content distribution process so as to hinder the information dispersal or even deplete the network resource. Therefore, content verification is an important and practical issue when network coding is employed. When random linear network coding is used, it is infeasible for the source of the content to sign all the data, and hence, the traditional "hash-and-sign” methods are no longer applicable. Recently, a new on-the-fly verification technique has been proposed by Krohn et al. (IEEE S&P '04), which employs a classical homomorphic hash function. However, this technique is difficult to be applied to network coding because of high computational and communication overhead. We explore this issue further by carefully analyzing different types of overhead, and propose methods to help reducing both the computational and communication cost, and provide provable security at the same time.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


MTechProjects.com offering final year Java Based Information Security MTech Projects, Information Security IEEE Projects, IEEE Information Security Projects, Information Security MS Projects, Java Based Information Security BTech
PROJECT TITLE :Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing - 2018ABSTRACT:Virtualized infrastructure in cloud computing has become an enticing target for cyberattackers to
PROJECT TITLE :Transmit-Power Minimization for NOMA-Enabled Traffic Offloading With Security Provisioning - 2018ABSTRACT:Non-orthogonal multiple access (NOMA) has been proposed as an effective technique to deal with the enormous
PROJECT TITLE :Beamforming Optimization for Physical Layer Security in MISO Wireless Networks - 2018ABSTRACT:A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped
PROJECT TITLE :A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet - 2018ABSTRACT:Cyber physical systems (CPSs) are increasingly being adopted in a very big selection of industries

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry