When Eco-IT meets security: Concealed network coding for multicast traffic

@article{Hessler2010WhenEM,
  title={When Eco-IT meets security: Concealed network coding for multicast traffic},
  author={Alban Hessler and Takahiro Kakumaru and Dirk Westhoff},
  journal={2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)},
  year={2010},
  pages={630-635}
}
Network coding techniques such as fountain codes are a promising way to disseminate large bulks of data in a multicast manner over an unreliable medium. In this work we investigate how to conceal such encoded data stream on its way to numerous receivers with a minimum investment. Compared to conventional 'encrypt - encode / decode - decrypt' approaches, our solution is preferable for two reasons: i) it causes less CPU investment for encryption and decryption up to orders of magnitude; ii… CONTINUE READING