메뉴 건너뛰기




Volumn 30, Issue 2, 2012, Pages 442-449

Cooperative defense against pollution attacks in network coding using SpaceMac

Author keywords

Communication networks; communication system security; cooperative systems; cryptographic protocols; message authentication; network coding; pollution attacks

Indexed keywords

COMMUNICATION SYSTEM SECURITY; COOPERATIVE SYSTEMS; CRYPTOGRAPHIC PROTOCOLS; MESSAGE AUTHENTICATION; POLLUTION ATTACKS;

EID: 84856294814     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2012.120224     Document Type: Article
Times cited : (51)

References (20)
  • 3
    • 70349146976 scopus 로고    scopus 로고
    • Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
    • Zurich, Switzerland
    • J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical Defenses against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks," in Proc. ACM WiSec 2009, Zurich, Switzerland, pp. 111-122.
    • Proc. ACM WiSec 2009 , pp. 111-122
    • Dong, J.1    Curtmola, R.2    Nita-Rotaru, C.3
  • 4
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative security for network coding file distribution
    • Barcelona, Spain
    • C. Gkantsidis and P. R. Rodriguez, "Cooperative Security for Network Coding File Distribution," in Proc. IEEE INFOCOM 2006, Barcelona, Spain, pp. 1-13.
    • (2006) Proc. IEEE INFOCOM , pp. 1-13
    • Gkantsidis, C.1    Rodriguez, P.R.2
  • 5
    • 0036353798 scopus 로고    scopus 로고
    • Secure network coding
    • Lausanne, Switzerland
    • N. Cai and R. W. Yeung, "Secure Network Coding," in Proc. ISIT 2002, Lausanne, Switzerland, p. 323.
    • Proc. ISIT , vol.2002 , pp. 323
    • Cai, N.1    Yeung, R.W.2
  • 7
    • 51649121337 scopus 로고    scopus 로고
    • Coding for errors and erasures in Random Network Coding
    • Nice, France
    • R. Koetter and F. R. Kschischang, "Coding for Errors and Erasures in Random Network Coding," in Proc. ISIT 2007, Nice, France, pp. 791-795.
    • (2007) Proc. ISIT , pp. 791-795
    • Koetter, R.1    Kschischang, F.R.2
  • 8
    • 3543050732 scopus 로고    scopus 로고
    • On-the-fly verification of rateless erasure codes for efficient content distribution
    • Oakland, CA, USA
    • M. N. Krohn, M. J. Freedman, and D. Mazieres, "On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution," in Proc. IEEE SP 2004, Oakland, CA, USA, pp. 226-240.
    • (2004) Proc. IEEE SP , pp. 226-240
    • Krohn, M.N.1    Freedman, M.J.2    Mazieres, D.3
  • 9
    • 68849097857 scopus 로고    scopus 로고
    • Homomorphic MACs : MAC-based integrity for network coding
    • Paris-Rocquencourt, France
    • S. Agrawal and D. Boneh, "Homomorphic MACs : MAC-Based Integrity for Network Coding," in Proc. ACNS 2009, Paris-Rocquencourt, France, pp. 292-305.
    • (2009) Proc. ACNS , pp. 292-305
    • Agrawal, S.1    Boneh, D.2
  • 10
  • 11
    • 67049095592 scopus 로고    scopus 로고
    • Signing a linear subspace : Signature schemes for network coding
    • Irvine, CA, USA
    • D. Boneh, D. Freeman, J. Katz, and B. Waters, "Signing a Linear Subspace : Signature Schemes for Network Coding," in Proc. PKC 2009, Irvine, CA, USA, pp. 68-87.
    • (2009) Proc. PKC , pp. 68-87
    • Boneh, D.1    Freeman, D.2    Katz, J.3    Waters, B.4
  • 12
    • 70349653419 scopus 로고    scopus 로고
    • Null keys : Limiting malicious attacks via null space properties of network coding
    • Rio de Janeiro, Brazil
    • E. Kehdi and B. Li, "Null Keys : Limiting Malicious Attacks Via Null Space Properties of Network Coding," in IEEE INFOCOM 2009, Rio de Janeiro, Brazil, pp. 1224-1232.
    • (2009) IEEE INFOCOM , pp. 1224-1232
    • Kehdi, E.1    Li, B.2
  • 13
    • 79960873240 scopus 로고    scopus 로고
    • Padding for orthogonality : Efficient subspace authentication for network coding
    • Shanghai, China
    • P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. S. Shen, "Padding for Orthogonality : Efficient Subspace Authentication for Network Coding," in IEEE INFOCOM 2011, Shanghai, China, pp. 1026-1034.
    • IEEE INFOCOM 2011 , pp. 1026-1034
    • Zhang, P.1    Jiang, Y.2    Lin, C.3    Yao, H.4    Wasef, A.5    Shen, X.S.6
  • 15
    • 77957830620 scopus 로고    scopus 로고
    • Identifying malicious nodes in network-coding-based peer-to-peer streaming networks
    • San Diego, CA, USA
    • Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks," in Proc. IEEE Mini INFOCOM 2010, San Diego, CA, USA, pp. 1-5.
    • Proc. IEEE Mini INFOCOM 2010 , pp. 1-5
    • Wang, Q.1    Vu, L.2    Nahrstedt, K.3    Khurana, H.4
  • 16
    • 80052990503 scopus 로고    scopus 로고
    • [Online]. Available
    • A. Le, "SpaceMac Library," 2011. [Online]. Available: http://www.ics.uci.edu/anhml/software.html#SpaceMac
    • (2011) SpaceMac Library
    • Le, A.1
  • 17
    • 80053033478 scopus 로고    scopus 로고
    • Cooperative defense against pollution attacks in network coding using spacemac
    • [Online] Available:
    • A. Le and A. Markopoulou, "Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac," in Technical Report. [Online]. Available: http://arxiv.org/abs/1102.3504
    • Technical Report
    • Le, A.1    Markopoulou, A.2
  • 18
    • 77955674519 scopus 로고    scopus 로고
    • Locating byzantine attackers in intra-session network coding using spacemac
    • Toronto, ON, Canada
    • A. Le and A. Markopoulou, "Locating Byzantine Attackers in Intra-Session Network Coding using SpaceMac," in Proc. NetCod 2010, Toronto, ON, Canada, pp. 1-6.
    • (2010) Proc. NetCod , pp. 1-6
    • Le, A.1    Markopoulou, A.2
  • 20
    • 47849104036 scopus 로고    scopus 로고
    • Subspace properties of randomized network coding
    • Bergen, Norway
    • M. Jafarisiavoshani, C. Fragouli, and S. Diggavi, "Subspace Properties of Randomized Network Coding," in Proc. ITW 2007, Bergen, Norway, pp. 1-5.
    • (2007) Proc. ITW , pp. 1-5
    • Jafarisiavoshani, M.1    Fragouli, C.2    Diggavi, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.