V. Talooki, D. Lucani, Hugo Marques, Jonathan Rodriguez
{"title":"Foreseen risks for network coding based surveillance applications","authors":"V. Talooki, D. Lucani, Hugo Marques, Jonathan Rodriguez","doi":"10.1145/2507908.2507915","DOIUrl":null,"url":null,"abstract":"This survey paper reviews key security weaknesses and attacks of network coding (NC) protocols, especially looking at the implications in surveillance applications. Surveillance is a critical use case, not only due to the stringent constraints or the importance of what is being protected by it, but because these systems are very likely to be attack with potentially serious implications to physical systems. We argue that NC can provide advantages from a performance as well as a security perspective. In particular, we focus on the latter presenting foreseen security risks on systems implementing NC and key countermeasures to curb potential threats.","PeriodicalId":166569,"journal":{"name":"HP-MOSys '13","volume":"91 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"HP-MOSys '13","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2507908.2507915","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This survey paper reviews key security weaknesses and attacks of network coding (NC) protocols, especially looking at the implications in surveillance applications. Surveillance is a critical use case, not only due to the stringent constraints or the importance of what is being protected by it, but because these systems are very likely to be attack with potentially serious implications to physical systems. We argue that NC can provide advantages from a performance as well as a security perspective. In particular, we focus on the latter presenting foreseen security risks on systems implementing NC and key countermeasures to curb potential threats.