메뉴 건너뛰기




Volumn , Issue , 2011, Pages

TESLA-based defense against pollution attacks in P2P systems with network coding

Author keywords

detection; homomorphic MAC; identification; network coding; Peer to peer; pollution; TESLA

Indexed keywords

BANDWIDTH OVERHEADS; COLLUSION RESISTANT; COMPUTATION OVERHEADS; COMPUTATIONAL DELAYS; DEFENSE MECHANISM; DEFENSE SYSTEM; DETECTION SCHEME; DETRIMENTAL EFFECTS; DYNAMIC TOPOLOGIES; HOMOMORPHIC MAC; IDENTIFICATION SCHEME; MESSAGE AUTHENTICATION CODES; NON-REPUDIATION; P2P SYSTEM; PEER TO PEER; PEER-TO-PEER SYSTEM; POLLUTION ATTACK; SOURCE AUTHENTICATION; STATE-OF-THE-ART SCHEME; TESLA;

EID: 80053034503     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISNETCOD.2011.5979096     Document Type: Conference Paper
Times cited : (18)

References (22)
  • 2
    • 25644448947 scopus 로고    scopus 로고
    • Network Coding for Large Scale Content Distribution
    • C. Gkantsidis and P. R. Rodriguez, "Network Coding for Large Scale Content Distribution," in INFOCOM'05.
    • INFOCOM'05
    • Gkantsidis, C.1    Rodriguez, P.R.2
  • 3
    • 77953317474 scopus 로고    scopus 로고
    • UUSee: Large-Scale Operational On-Demand Streaming with Random Network Coding
    • Z. Liu, C. Wu, B. Li, and S. Zhao, "UUSee : Large-Scale Operational On-Demand Streaming with Random Network Coding," in INFOCOM'10.
    • INFOCOM'10
    • Liu, Z.1    Wu, C.2    Li, B.3    Zhao, S.4
  • 4
    • 36749056448 scopus 로고    scopus 로고
    • R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
    • Dec.
    • M. Wang and B. Li, "R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming," JSAC, vol. 25, no. 9, Dec. 2007.
    • (2007) JSAC , vol.25 , Issue.9
    • Wang, M.1    Li, B.2
  • 5
    • 79951942028 scopus 로고    scopus 로고
    • Random Network Coding in Peer-to-Peer Networks: From Theory to Practice
    • B. Li and D. Niu, "Random Network Coding in Peer-to-Peer Networks : From Theory to Practice," IEEE, vol. 99, no. 3, 2011.
    • (2011) IEEE , vol.99 , Issue.3
    • Li, B.1    Niu, D.2
  • 6
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative Security for Network Coding File Distribution
    • C. Gkantsidis and P. R. Rodriguez, "Cooperative Security for Network Coding File Distribution," in INFOCOM'06.
    • INFOCOM'06
    • Gkantsidis, C.1    Rodriguez, P.R.2
  • 7
    • 80052990890 scopus 로고    scopus 로고
    • On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution
    • M. N. Krohn, M. J. Freedman, and D. Mazieres, "On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution," in SP'04.
    • SP'04
    • Krohn, M.N.1    Freedman, M.J.2    Mazieres, D.3
  • 8
    • 68849117052 scopus 로고    scopus 로고
    • Signing a Linear Subspace: Signature Schemes for Network Coding
    • D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a Linear Subspace : Signature Schemes for Network Coding," in PKC'09.
    • PKC'09
    • Boneh, D.1    Freeman, D.2    Katz, J.3    Waters, B.4
  • 11
    • 79960873240 scopus 로고    scopus 로고
    • Padding for Orthogonality: Efficient Subspace Authentication for Network Coding
    • P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. S. Shen, "Padding for Orthogonality : Efficient Subspace Authentication for Network Coding," in INFOCOM'11.
    • INFOCOM'11
    • Zhang, P.1    Jiang, Y.2    Lin, C.3    Yao, H.4    Wasef, A.5    Shen, X.S.6
  • 12
    • 78249273398 scopus 로고    scopus 로고
    • Homomorphic MACs: MAC-Based Integrity for Network Coding
    • S. Agrawal and D. Boneh, "Homomorphic MACs : MAC-Based Integrity for Network Coding," in ACNS'09.
    • ACNS'09
    • Agrawal, S.1    Boneh, D.2
  • 15
    • 80053005778 scopus 로고    scopus 로고
    • Identifying Malicious Nodes in Network-Coding- Based Peer-to-Peer Streaming Networks
    • Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "Identifying Malicious Nodes in Network-Coding- Based Peer-to-Peer Streaming Networks," in Mini INFOCOM'10.
    • Mini INFOCOM'10
    • Wang, Q.1    Vu, L.2    Nahrstedt, K.3    Khurana, H.4
  • 16
    • 70349146976 scopus 로고    scopus 로고
    • Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks
    • J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks," in ACM WiSec'09.
    • ACM WiSec'09
    • Dong, J.1    Curtmola, R.2    Nita-Rotaru, C.3
  • 17
    • 70349653419 scopus 로고    scopus 로고
    • Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
    • E. Kehdi and B. Li, "Null Keys : Limiting Malicious Attacks Via Null Space Properties of Network Coding," in INFOCOM'09.
    • INFOCOM'09
    • Kehdi, E.1    Li, B.2
  • 19
    • 80053039714 scopus 로고    scopus 로고
    • Locating Byzantine Attackers in Intra-Session Network Coding using SpaceMac
    • A. Le and A. Markopoulou, "Locating Byzantine Attackers in Intra-Session Network Coding using SpaceMac," in NetCod'10.
    • NetCod'10
    • Le, A.1    Markopoulou, A.2
  • 20
    • 0002741922 scopus 로고    scopus 로고
    • Efficient and Secure Source Authentication for Multicast
    • A. Perrig, R. Canetti, D. Song, and J. D. Tygar, "Efficient and Secure Source Authentication for Multicast," in NDSS'01.
    • NDSS'01
    • Perrig, A.1    Canetti, R.2    Song, D.3    Tygar, J.D.4
  • 22
    • 80052990503 scopus 로고    scopus 로고
    • [Online]. Available
    • A. Le, "SpaceMac Library," 2011. [Online]. Available: http://www.ics.uci.edu/~anhml/software.html#SpaceMac
    • (2011) SpaceMac Library
    • Le, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.