메뉴 건너뛰기




Volumn 25, Issue 1, 2014, Pages 33-42

A tag encoding scheme against pollution attack to linear network coding

Author keywords

Byzantine attack; compromised nodes; Network coding; pollution attack; security

Indexed keywords

ENCODING (SYMBOLS); FAULT TOLERANCE; LINEAR NETWORKS; NETWORK SECURITY; POLLUTION DETECTION;

EID: 84923202070     PISSN: 10459219     EISSN: 15582183     Source Type: Journal    
DOI: 10.1109/TPDS.2013.24     Document Type: Article
Times cited : (46)

References (32)
  • 5
    • 77955178649 scopus 로고    scopus 로고
    • On homomorphic signatures for network coding
    • Mar
    • A. Yun, J. Cheon, and Y. Kim, "On Homomorphic Signatures for Network Coding, " IEEE Trans. Computers, vol. 59, no. 9, pp. 1295-1296, Mar. 2010.
    • (2010) IEEE Trans. Computers , vol.59 , Issue.9 , pp. 1295-1296
    • Yun, A.1    Cheon, J.2    Kim, Y.3
  • 6
    • 51349130622 scopus 로고    scopus 로고
    • An efficient signature-based scheme for securing network coding against pollution attacks
    • Apr.
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Signature-Based Scheme for Securing Network Coding against Pollution Attacks, " Proc. IEEE INFOCOM, Apr. 2008.
    • (2008) Proc. IEEE INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 9
    • 3543050732 scopus 로고    scopus 로고
    • On-the-fly verification of rateless erasure codes for efficient content distribution
    • May
    • M. Krohn, M. Freedman, and D. Mazieres, "On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution, " Proc. IEEE Symp. Security and Privacy, May 2004.
    • (2004) Proc. IEEE Symp. Security and Privacy
    • Krohn, M.1    Freedman, M.2    Mazieres, D.3
  • 11
    • 39049090594 scopus 로고    scopus 로고
    • Cooperative security for network coding file distribution
    • Apr.
    • G. Gkantsidisand and P. Rodriguez, "Cooperative Security for Network Coding File Distribution, " Proc. IEEE INFOCOM, Apr. 2006.
    • (2006) Proc. IEEE INFOCOM
    • Gkantsidisand, G.1    Rodriguez, P.2
  • 12
    • 79959817037 scopus 로고    scopus 로고
    • Practical defenses against pollution attacks in wireless network coding
    • May
    • J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical Defenses Against Pollution Attacks in Wireless Network Coding, " ACM Trans. Information and System Security, vol. 14, no. 1, article 7, May 2011.
    • (2011) ACM Trans. Information and System Security , vol.14 , Issue.1
    • Dong, J.1    Curtmola, R.2    Nita-Rotaru, C.3
  • 14
    • 70349664122 scopus 로고    scopus 로고
    • An efficient scheme for securing xor network coding against pollution attacks
    • Apr.
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks, " Proc. IEEE INFOCOM, Apr. 2009.
    • (2009) Proc. IEEE INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 15
    • 79960873240 scopus 로고    scopus 로고
    • Padding for orthogonality : Efficient subspace authentication for network coding
    • Apr.
    • P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X.S. Shen, "Padding for Orthogonality : Efficient Subspace Authentication for Network Coding, " Proc. IEEE INFOCOM, Apr. 2011.
    • (2011) Proc. IEEE INFOCOM
    • Zhang, P.1    Jiang, Y.2    Lin, C.3    Yao, H.4    Wasef, A.5    Shen, X.S.6
  • 18
    • 77957830620 scopus 로고    scopus 로고
    • Identifying malicious nodes in network-coding-based peer-to-peer streaming networks
    • Mar.
    • Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, "Identifying Malicious Nodes in Network-Coding-Based Peer-to-Peer Streaming Networks, " Proc. IEEE INFOCOM, Mar. 2010.
    • (2010) Proc. IEEE INFOCOM
    • Wang, Q.1    Vu, L.2    Nahrstedt, K.3    Khurana, H.4
  • 19
    • 48849089497 scopus 로고    scopus 로고
    • Coding for errors and erasures in random network coding
    • Aug.
    • R. Koetter and F.R. Kschischang, "Coding for Errors and Erasures in Random Network Coding, " IEEE Trans. Information Theory, vol. 54, no. 8, pp. 3579-3591, Aug. 2008.
    • (2008) IEEE Trans. Information Theory , vol.54 , Issue.8 , pp. 3579-3591
    • Koetter, R.1    Kschischang, F.R.2
  • 22
    • 80053034503 scopus 로고    scopus 로고
    • TESLA-based defense against pollution attacks in p2p systems with network coding
    • July
    • A. Le and A. Markopoulou, "TESLA-Based Defense against Pollution Attacks in P2P Systems with Network Coding, " Proc. IEEE Int'l Symp. Network Coding (NetCod), July 2011.
    • (2011) Proc. IEEE Int'l Symp. Network Coding (NetCod)
    • Le, A.1    Markopoulou, A.2
  • 23
    • 38349083344 scopus 로고    scopus 로고
    • Network error correction, part 2: Lower bounds
    • N. Cai and R.W. Yeung, "Network Error Correction, Part 2: Lower Bounds, " Comm. in Information and Systems, vol. 6, no. 1, pp. 37-54, 2006.
    • (2006) Comm. in Information and Systems , vol.6 , Issue.1 , pp. 37-54
    • Cai, N.1    Yeung, R.W.2
  • 24
    • 46749115942 scopus 로고    scopus 로고
    • Network error correction coding in packetized networks
    • Oct.
    • Z. Zhang, "Network Error Correction Coding in Packetized Networks, " Proc. IEEE Information Theory Workshop, Oct. 2006.
    • (2006) Proc. IEEE Information Theory Workshop
    • Zhang, Z.1
  • 25
    • 84655169995 scopus 로고    scopus 로고
    • An authentication code against pollution attacks in network coding
    • Mar
    • F. Oggier and H. Fathi, "An Authentication Code against Pollution Attacks in Network Coding, " IEEE/ACM Trans. Networking, vol. 19, no. 6, pp. 1587-1596, Mar. 2011.
    • (2011) IEEE/ACM Trans. Networking , vol.19 , Issue.6 , pp. 1587-1596
    • Oggier, F.1    Fathi, H.2
  • 26
    • 33745161352 scopus 로고    scopus 로고
    • Overcoming untuned radios in wireless networks with network coding
    • June
    • D. Petrovic, K. Ramchandran, and J. Rabaey, "Overcoming Untuned Radios in Wireless Networks with Network Coding, " IEEE Trans. Information Theory, vol. 52, no. 6, pp. 2649-2657, June 2006.
    • (2006) IEEE Trans. Information Theory , vol.52 , Issue.6 , pp. 2649-2657
    • Petrovic, D.1    Ramchandran, K.2    Rabaey, J.3
  • 27
    • 25644448947 scopus 로고    scopus 로고
    • Network coding for large scale file distribution
    • Mar.
    • C. Gkantsidis and P. Rodriguez, "Network Coding for Large Scale File Distribution, " Proc. IEEE INFOCOM, Mar. 2005.
    • (2005) Proc. IEEE INFOCOM
    • Gkantsidis, C.1    Rodriguez, P.2
  • 29
    • 84863048699 scopus 로고    scopus 로고
    • On the security and efficiency of content distribution via network coding
    • Jan
    • Q. Li, J.C.S. Lui, and D.-M. Chiu, "On the Security and Efficiency of Content Distribution via Network Coding, " IEEE Trans. Dependable and Secure Computing, vol. 9, no. 2, pp. 211-221, Jan. 2011.
    • (2011) IEEE Trans. Dependable and Secure Computing , vol.9 , Issue.2 , pp. 211-221
    • Li, Q.1    Lui, J.C.S.2    Chiu, D.-M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.