Authors
Christos Gkantsidis, Pablo Rodriguez
Publication date
2006/4/23
Conference
INFOCOM
Volume
3
Issue
2006
Pages
5
Description
Peer-to-peer content distribution networks can suf-fer from malicious participants that corrupt content. Current systems verify blocks with traditional cryptographic signatures and hashes. However, these techniques do not apply well to more elegant schemes that use network coding techniques for efficient content distribution.
Architectures that use network coding are prone to jamming attacks where the introduction of a few corrupted blocks can quickly result in a large number of bad blocks propagating through the system. Identifying such bogus blocks is difficult and requires the use of homomorphic hashing functions, which are computationally expensive.
Total citations
20052006200720082009201020112012201320142015201620172018201920202021202220232024313132830483649393530281898117771