Resilient network coding in the presence of byzantine adversaries
Network coding substantially increases network throughput. But since it involves mixing of
information inside the network, a single corrupted packet generated by a malicious node can …
information inside the network, a single corrupted packet generated by a malicious node can …
[LIVRE][B] Network coding: an introduction
Network coding promises to significantly impact the way communications networks are
designed, operated, and understood. This book presents a unified and intuitive overview of …
designed, operated, and understood. This book presents a unified and intuitive overview of …
On security against pollution attacks in network coding enabled 5g networks
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …
cater the requirements of the ever-increasing digital devices. Higher data rate with low …
Random linear network coding: A free cipher?
We consider the level of information security provided by random linear network coding in
network scenarios in which all nodes comply with the communication protocols yet are …
network scenarios in which all nodes comply with the communication protocols yet are …
Node-capture resilient key establishment in sensor networks: Design space and new protocols
Key management is required for basic security services of confidentiality, integrity, and data
source authentication. Wireless sensor networks (WSNs) are a challenging environment to …
source authentication. Wireless sensor networks (WSNs) are a challenging environment to …
Secure network coding for wiretap networks of type II
We consider the problem of securing a multicast network against a wiretapper that can
eavesdrop on the packets on a limited number of network edges of its choice. We assume …
eavesdrop on the packets on a limited number of network edges of its choice. We assume …
Null keys: Limiting malicious attacks via null space properties of network coding
E Kehdi, B Li - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
The performance of randomized network coding can suffer significantly when malicious
nodes corrupt the content of the exchanged blocks. Previous work have introduced error …
nodes corrupt the content of the exchanged blocks. Previous work have introduced error …
Cooperative defense against pollution attacks in network coding using spacemac
Intra-session network coding is inherently vulnerable to pollution attacks. In this paper, first,
we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an …
we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an …
Refined coding bounds and code constructions for coherent network error correction
Coherent network error correction is the error-control problem in network coding with the
knowledge of the network codes at the source and sink nodes. With respect to a given set of …
knowledge of the network codes at the source and sink nodes. With respect to a given set of …
Network decoding
We consider the problem of error control in a coded, multicast network, focusing on the
scenario where the errors can occur only on a proper subset of the network edges. We …
scenario where the errors can occur only on a proper subset of the network edges. We …