On security against pollution attacks in network coding enabled 5g networks

VA Vasudevan, C Tselios, I Politis - IEEE Access, 2020 - ieeexplore.ieee.org
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …

[BOOK][B] Cyber-physical systems: from theory to practice

DB Rawat, JJPC Rodrigues, I Stojmenovic - 2015 - books.google.com
Although comprehensive knowledge of cyber-physical systems (CPS) is becoming a must
for researchers, practitioners, system designers, policy makers, system managers, and …

[HTML][HTML] Security engineering of patient-centered health care information systems in peer-to-peer environments: systematic review

I Abdullahi Yari, T Dehling, F Kluge, J Geck… - Journal of Medical …, 2021 - jmir.org
Background Patient-centered health care information systems (PHSs) enable patients to
take control and become knowledgeable about their own health, preferably in a secure …

SECRET—Secure network coding for reduced energy next generation mobile small cells: A European Training Network in wireless communications and networking …

J Rodriguez, A Radwan, C Barbosa… - 2017 Internet …, 2017 - ieeexplore.ieee.org
SECRET is a collaborative European Training Network (ETN) committed to create an
excellent educational training platform for Early Stage Researchers (ESRs) in the field of …

Cooperative defense against pollution attacks in network coding using spacemac

A Le, A Markopoulou - IEEE Journal on Selected Areas in …, 2012 - ieeexplore.ieee.org
Intra-session network coding is inherently vulnerable to pollution attacks. In this paper, first,
we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an …

An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks

A Esfahani, G Mantas, J Rodriguez… - International Journal of …, 2017 - Springer
Recent research efforts have shown that wireless networks can benefit from network coding
(NC) technology in terms of bandwidth, robustness to packet losses, delay and energy …

IDLP: An efficient intrusion detection and location-aware prevention mechanism for network coding-enabled mobile small cells

R Parsamehr, G Mantas, J Rodriguez… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile small cell technology is considered as a 5G enabling technology for delivering
ubiquitous 5G services in a cost-effective and energy efficient manner. Moreover, Network …

An efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC

A Esfahani, G Mantas… - IEEE Communications …, 2016 - ieeexplore.ieee.org
This letter proposes an efficient null space-based homomorphic message authentication
code scheme providing resistance against tag pollution attacks in random linear network …

Online decentralized multi-agents meta-learning with Byzantine resiliency

OT Odeyomi, B Ude, K Roy - IEEE Access, 2023 - ieeexplore.ieee.org
Meta-learning is a learning-to-learn paradigm that leverages past learning experiences for
quick adaptation to new learning tasks. It has a wide application, such as in few-shot …

An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification

T Lawrence, F Li, I Ali, MY Kpiebaareh… - Journal of Systems …, 2021 - Elsevier
Authentication schemes based on homomorphic message authentication codes (HMACs)
with or without a homomorphic cryptographic signature (HCS) have always played a vital …