Secure network coding for wireless mesh networks: Threats, challenges, and directions

J Dong, R Curtmola, C Nita-Rotaru - Computer Communications, 2009 - Elsevier
In recent years, network coding has emerged as a new communication paradigm that can
significantly improve the efficiency of network protocols by requiring intermediate nodes to …

[BOK][B] Cyber-physical systems: from theory to practice

DB Rawat, JJPC Rodrigues, I Stojmenovic - 2015 - books.google.com
This book presents state-of-the-art of research results related to the science, technology, and
engineering of cyber-physical systems (CPS), including system architecture, development …

Security concerns and countermeasures in network coding based communication systems: A survey

VN Talooki, R Bassoli, DE Lucani, J Rodriguez… - Computer Networks, 2015 - Elsevier
This survey paper shows the state of the art in security mechanisms, where a deep review of
the current research and the status of this topic is carried out. We start by introducing …

RIPPLE authentication for network coding

Y Li, H Yao, M Chen, S Jaggi… - 2010 Proceedings IEEE …, 2010 - ieeexplore.ieee.org
By allowing routers to randomly mix the information content in packets before forwarding
them, network coding can maximize network throughput in a distributed manner with low …

Padding for orthogonality: Efficient subspace authentication for network coding

P Zhang, Y Jiang, C Lin, H Yao… - 2011 Proceedings …, 2011 - ieeexplore.ieee.org
Network coding provides a promising alternative to traditional store-and-forward
transmission paradigm. However, due to its information-mixing nature, network coding is …

PSDS–proficient security over distributed storage: a method for data transmission in cloud

F Shahid, H Ashraf, A Ghani, SAK Ghayyur… - IEEE …, 2020 - ieeexplore.ieee.org
Cloud Computing facilitates business by storing an enormous amount of data in the cloud
transmitted over the Internet with seamless access to the data and no hardware compatibility …

Cooperative defense against pollution attacks in network coding using spacemac

A Le, A Markopoulou - IEEE Journal on Selected Areas in …, 2012 - ieeexplore.ieee.org
Intra-session network coding is inherently vulnerable to pollution attacks. In this paper, first,
we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an …

Lightweight secure detection service for malicious attacks in wsn with timestamp-based mac

Z Zhai, G Lai, B Cheng, J Qian, L Zhao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Sensors in wireless sensor network (WSN) are usually deployed in the wild or even hostile
circumstance. What is worse, most of the sensors have limited communication bandwidth …

A tag encoding scheme against pollution attack to linear network coding

X Wu, Y Xu, C Yuen, L **ang - IEEE Transactions on Parallel …, 2013 - ieeexplore.ieee.org
Network coding allows intermediate nodes to encode data packets to improve network
throughput and robustness. However, it increases the propagation speed of polluted data …

MIS: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming

Q Wang, L Vu, K Nahrstedt… - 2010 Proceedings IEEE …, 2010 - ieeexplore.ieee.org
Network coding has been shown to be capable of greatly improving quality of service in P2P
live streaming systems (eg, IPTV). However, network coding is vulnerable to pollution …