Network coding meets multimedia: A review

E Magli, M Wang, P Frossard… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
While every network node only relays messages in a traditional communication system, the
recent network coding (NC) paradigm proposes to implement simple in-network processing …

A tag encoding scheme against pollution attack to linear network coding

X Wu, Y Xu, C Yuen, L **ang - IEEE Transactions on Parallel …, 2013 - ieeexplore.ieee.org
Network coding allows intermediate nodes to encode data packets to improve network
throughput and robustness. However, it increases the propagation speed of polluted data …

Cooperative defense against pollution attacks in network coding using spacemac

A Le, A Markopoulou - IEEE Journal on Selected Areas in …, 2012 - ieeexplore.ieee.org
Intra-session network coding is inherently vulnerable to pollution attacks. In this paper, first,
we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an …

IDLP: An efficient intrusion detection and location-aware prevention mechanism for network coding-enabled mobile small cells

R Parsamehr, G Mantas, J Rodriguez… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile small cell technology is considered as a 5G enabling technology for delivering
ubiquitous 5G services in a cost-effective and energy efficient manner. Moreover, Network …

MIS: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming

Q Wang, L Vu, K Nahrstedt… - 2010 Proceedings IEEE …, 2010 - ieeexplore.ieee.org
Network coding has been shown to be capable of greatly improving quality of service in P2P
live streaming systems (eg, IPTV). However, network coding is vulnerable to pollution …

TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding

C Cheng, T Jiang, Q Zhang - IEEE Journal on Selected Areas …, 2013 - ieeexplore.ieee.org
Recently, the peer-to-peer (P2P) live streaming system has benefited from the advent of
network coding. However, it was demonstrated that malicious nodes could significantly …

Locating byzantine attackers in intra-session network coding using spacemac

A Le, A Markopoulou - 2010 IEEE International Symposium on …, 2010 - ieeexplore.ieee.org
Intra-session network coding is known to be vulnerable to Byzantine attacks: malicious
nodes can inject bogus packets, which get combined with legitimate blocks at downstream …

ACORNS-towards computational modeling of communication and recognition skills

L Boves, L ten Bosch, R Moore - 6th IEEE International …, 2007 - ieeexplore.ieee.org
In this paper the FP6 Future and Emerging Technologies project ACORNS is introduced.
This project aims at simulating embodied language learning, inspired by the memory …

Passive network tomography for erroneous networks: A network coding approach

H Yao, S Jaggi, M Chen - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
Passive network tomography uses end-to-end observations of network communications to
characterize the network, for instance, to estimate the network topology and to localize …

Optimal byzantine attacker identification based on game theory in network coding enabled wireless ad hoc networks

X Liu, TJ Lim, J Huang - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Byzantine attack is a severe security concern in network coding enabled wireless ad hoc
networks, because the malicious nodes can easily inject bogus packets into the information …