Secure network coding for wireless mesh networks: Threats, challenges, and directions

J Dong, R Curtmola, C Nita-Rotaru - Computer Communications, 2009 - Elsevier
In recent years, network coding has emerged as a new communication paradigm that can
significantly improve the efficiency of network protocols by requiring intermediate nodes to …

On security against pollution attacks in network coding enabled 5g networks

VA Vasudevan, C Tselios, I Politis - IEEE Access, 2020 - ieeexplore.ieee.org
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …

[图书][B] Cyber-physical systems: from theory to practice

DB Rawat, JJPC Rodrigues, I Stojmenovic - 2015 - books.google.com
Although comprehensive knowledge of cyber-physical systems (CPS) is becoming a must
for researchers, practitioners, system designers, policy makers, system managers, and …

Secure network coding over the integers

R Gennaro, J Katz, H Krawczyk, T Rabin - … Paris, France, May 26-28, 2010 …, 2010 - Springer
Network coding offers the potential to increase throughput and improve robustness without
any centralized control. Unfortunately, network coding is highly susceptible to “pollution …

SECRET—Secure network coding for reduced energy next generation mobile small cells: A European Training Network in wireless communications and networking …

J Rodriguez, A Radwan, C Barbosa… - 2017 Internet …, 2017 - ieeexplore.ieee.org
SECRET is a collaborative European Training Network (ETN) committed to create an
excellent educational training platform for Early Stage Researchers (ESRs) in the field of …

An efficient scheme for securing XOR network coding against pollution attacks

Z Yu, Y Wei, B Ramkumar, Y Guan - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
Network coding is promising to maximize throughput in various networking systems.
Compared to normal network coding operated over large finite fields, XOR network coding …

A homomorphic network coding signature scheme for multiple sources and its application in IoT

T Li, W Chen, Y Tang, H Yan - Security and communication …, 2018 - Wiley Online Library
As a method for increasing throughput and improving reliability of routing, network coding
has been widely used in decentralized IoT systems. When files are shared in the system …

An efficient privacy-preserving scheme against traffic analysis attacks in network coding

Y Fan, Y Jiang, H Zhu, X Shen - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
Privacy threat is one of the critical issues in network coding, where attacks such as traffic
analysis can be easily launched by a malicious adversary once enough encoded packets …

Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks

J Dong, R Curtmola, C Nita-Rotaru - … of the second ACM conference on …, 2009 - dl.acm.org
Recent studies show that network coding can provide significant benefits to network
protocols, such as increased throughput, reduced network congestion, higher reliability, and …

Preserving data integrity for smart grid data aggregation

F Li, B Luo - 2012 IEEE Third International Conference on …, 2012 - ieeexplore.ieee.org
In smart grid systems, secure in-network data aggregation approaches have been
introduced to efficiently collect aggregation data, while preserving data privacy of individual …