Resilient network coding in the presence of byzantine adversaries

S Jaggi, M Langberg, S Katti, T Ho… - … INFOCOM 2007-26th …, 2007 - ieeexplore.ieee.org
Network coding substantially increases network throughput. But since it involves mixing of
information inside the network, a single corrupted packet generated by a malicious node can …

[LIVRE][B] Network coding: an introduction

T Ho, D Lun - 2008 - books.google.com
Network coding promises to significantly impact the way communications networks are
designed, operated, and understood. This book presents a unified and intuitive overview of …

On security against pollution attacks in network coding enabled 5g networks

VA Vasudevan, C Tselios, I Politis - IEEE Access, 2020 - ieeexplore.ieee.org
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …

Random linear network coding: A free cipher?

L Lima, M Médard, J Barros - 2007 IEEE international …, 2007 - ieeexplore.ieee.org
We consider the level of information security provided by random linear network coding in
network scenarios in which all nodes comply with the communication protocols yet are …

Node-capture resilient key establishment in sensor networks: Design space and new protocols

A Newell, H Yao, A Ryker, T Ho… - ACM Computing Surveys …, 2014 - dl.acm.org
Key management is required for basic security services of confidentiality, integrity, and data
source authentication. Wireless sensor networks (WSNs) are a challenging environment to …

Secure network coding for wiretap networks of type II

S El Rouayheb, E Soljanin… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
We consider the problem of securing a multicast network against a wiretapper that can
eavesdrop on the packets on a limited number of network edges of its choice. We assume …

Null keys: Limiting malicious attacks via null space properties of network coding

E Kehdi, B Li - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
The performance of randomized network coding can suffer significantly when malicious
nodes corrupt the content of the exchanged blocks. Previous work have introduced error …

Cooperative defense against pollution attacks in network coding using spacemac

A Le, A Markopoulou - IEEE Journal on Selected Areas in …, 2012 - ieeexplore.ieee.org
Intra-session network coding is inherently vulnerable to pollution attacks. In this paper, first,
we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an …

Refined coding bounds and code constructions for coherent network error correction

S Yang, RW Yeung, CK Ngai - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Coherent network error correction is the error-control problem in network coding with the
knowledge of the network codes at the source and sink nodes. With respect to a given set of …

Network decoding

A Beemer, AB Kılıç, A Ravagnani - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We consider the problem of error control in a coded, multicast network, focusing on the
scenario where the errors can occur only on a proper subset of the network edges. We …