Network coding meets multimedia: A review
While every network node only relays messages in a traditional communication system, the
recent network coding (NC) paradigm proposes to implement simple in-network processing …
recent network coding (NC) paradigm proposes to implement simple in-network processing …
A tag encoding scheme against pollution attack to linear network coding
X Wu, Y Xu, C Yuen, L **ang - IEEE Transactions on Parallel …, 2013 - ieeexplore.ieee.org
Network coding allows intermediate nodes to encode data packets to improve network
throughput and robustness. However, it increases the propagation speed of polluted data …
throughput and robustness. However, it increases the propagation speed of polluted data …
Cooperative defense against pollution attacks in network coding using spacemac
Intra-session network coding is inherently vulnerable to pollution attacks. In this paper, first,
we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an …
we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an …
IDLP: An efficient intrusion detection and location-aware prevention mechanism for network coding-enabled mobile small cells
Mobile small cell technology is considered as a 5G enabling technology for delivering
ubiquitous 5G services in a cost-effective and energy efficient manner. Moreover, Network …
ubiquitous 5G services in a cost-effective and energy efficient manner. Moreover, Network …
MIS: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P
live streaming systems (eg, IPTV). However, network coding is vulnerable to pollution …
live streaming systems (eg, IPTV). However, network coding is vulnerable to pollution …
TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding
Recently, the peer-to-peer (P2P) live streaming system has benefited from the advent of
network coding. However, it was demonstrated that malicious nodes could significantly …
network coding. However, it was demonstrated that malicious nodes could significantly …
Locating byzantine attackers in intra-session network coding using spacemac
Intra-session network coding is known to be vulnerable to Byzantine attacks: malicious
nodes can inject bogus packets, which get combined with legitimate blocks at downstream …
nodes can inject bogus packets, which get combined with legitimate blocks at downstream …
ACORNS-towards computational modeling of communication and recognition skills
In this paper the FP6 Future and Emerging Technologies project ACORNS is introduced.
This project aims at simulating embodied language learning, inspired by the memory …
This project aims at simulating embodied language learning, inspired by the memory …
Passive network tomography for erroneous networks: A network coding approach
Passive network tomography uses end-to-end observations of network communications to
characterize the network, for instance, to estimate the network topology and to localize …
characterize the network, for instance, to estimate the network topology and to localize …
Optimal byzantine attacker identification based on game theory in network coding enabled wireless ad hoc networks
X Liu, TJ Lim, J Huang - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Byzantine attack is a severe security concern in network coding enabled wireless ad hoc
networks, because the malicious nodes can easily inject bogus packets into the information …
networks, because the malicious nodes can easily inject bogus packets into the information …