We introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast to erasure codes, distillation codes are robust against pollution attacks, a powerful class of denial of service (DoS) attacks in which adversaries inject invalid symbols during the decoding process. We examine applications of distillation codes to multicast authentication. Previous applications of erasure codes to multicast authentication are vulnerable to low bandwidth pollution attacks. We demonstrate pollution attacks against previous approaches which prevent receivers from verifying any authentic packets. To resist pollution attacks, we ...
Abstract—By allowing routers to randomly mix the informa-tion content in packets before forwarding t...
Network coding (NC)-based peer-to-peer (P2P) streaming represents an effective solution to aggregate...
[[abstract]]Malicious intruders may launch as many invalid requests as possible without establishing...
Authentication is an important security measure for multicast applications, providing receivers with...
We study the multicast stream authentication problem when an opponent can drop, reorder and introduc...
We describe a novel method for authenticating multicast packets that is robust against packet loss. ...
Systems exploiting network coding suffer greatly from pollution attacks which consist of injecting...
We study the multicast stream authentication problem when the communication channel is under control...
Various schemes have been proposed to achieve strong authentication of streamed data in a lossy netw...
We address the multicast stream authentication problem when the communication channel is under the c...
We consider the stream authentication problem when an adversary has the ability to drop, reorder or ...
A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was p...
During a pollution attack, malicious nodes purposely transmit bogus data to the honest nodes to crip...
Providing authentication mechanisms for IP-Multicast streams is paramount for the development of lar...
Signature amortization schemes have been introduced for authenticating multicast streams, in which, ...
Abstract—By allowing routers to randomly mix the informa-tion content in packets before forwarding t...
Network coding (NC)-based peer-to-peer (P2P) streaming represents an effective solution to aggregate...
[[abstract]]Malicious intruders may launch as many invalid requests as possible without establishing...
Authentication is an important security measure for multicast applications, providing receivers with...
We study the multicast stream authentication problem when an opponent can drop, reorder and introduc...
We describe a novel method for authenticating multicast packets that is robust against packet loss. ...
Systems exploiting network coding suffer greatly from pollution attacks which consist of injecting...
We study the multicast stream authentication problem when the communication channel is under control...
Various schemes have been proposed to achieve strong authentication of streamed data in a lossy netw...
We address the multicast stream authentication problem when the communication channel is under the c...
We consider the stream authentication problem when an adversary has the ability to drop, reorder or ...
A predictive-hashing based Denial-of-Service (DoS) resistant multicast authentication protocol was p...
During a pollution attack, malicious nodes purposely transmit bogus data to the honest nodes to crip...
Providing authentication mechanisms for IP-Multicast streams is paramount for the development of lar...
Signature amortization schemes have been introduced for authenticating multicast streams, in which, ...
Abstract—By allowing routers to randomly mix the informa-tion content in packets before forwarding t...
Network coding (NC)-based peer-to-peer (P2P) streaming represents an effective solution to aggregate...
[[abstract]]Malicious intruders may launch as many invalid requests as possible without establishing...