627
Views
5
CrossRef citations to date
0
Altmetric
Articles

A novel approach for anti-pollution attacks in network coding

, , , &
Pages 447-462 | Received 07 Jul 2020, Accepted 04 Oct 2020, Published online: 02 Apr 2021

References

  • Adat, V., Tselios, C., & Tselios, I. (2020). On security against pollution attacks in network coding enabled 5G networks. IEEE Access, 9, 1–15. https://doi.org/10.1109/ACCESS.2020.2975761
  • Agrawal, S., Boneh, D., Boyen, X., & Freeman, D. (2010). Preventing pollution attacks in multi-source network coding. In PKC'10,O 2010.
  • Ahlswede, R., Cai, N., & Li, S. Y. (2000). Network information flow. IEEE Trans on Information Theory, 46, 1204–1216. https://doi.org/10.1109/18.850663
  • Awerbuch, B., Holmer, D., Rotaru, C. N-., & Rubens, H. (2002). An on-demand secure routing protocol resilient to byzantine failures. In Proc. of the 1st ACM Workshop on Wireless security (WiSe'02). ACM Press.
  • Barros, R. (2012). Global mobile information systems simulation library -- glomosim. Retrieved from http://pcl.cs.ucla.edu/projects/glomosim/.
  • Cai, N., & Yeung, R. W. (2002). Secure network coding. In ISIT'02, 2002.
  • Charles, D., Jian, K., & Lauter, K. (2015). Signature for network coding (Technique Report, Report No. MSR-TR-2015-159).
  • Damiani, E., Vimercati, D. C., Paraboschi, S., Samarati, P., & Violante, F. (2012). A reputation-based approach for choosing reliable resources in peer-to-peer networks. In CCS'12, 2012.
  • Dong, J., Curtmola, R., & Nita-Rotaru, C. (2018). Pollution attacks and defenses in wireless interflow network coding systems. IEEE Transactions on Dependable & Secure Computing, 9, 741–755. https://doi.org/10.1109/TDSC.2012.39
  • Gayathri, R., & Maria Sofi Anusuya, J. (2018). Preventing Malicious node and provide secure routing in manet. IOSR Journal of Electronics and Communication Engineering, 10, 09–13.
  • Gu, G., Zhang, J., & Lee, W. (2018). BotSniffer: Detecting botnet command and control channels in network traffic. In NDSS'18, 2018.
  • Ho, T., Koetter, R., Medard, M., Karger, D., & Effros, M. (2013). The benefits of coding over routing in a randomized settings. ISIT'03 (pp. 203–212).
  • Ho, T., Leong, B., Koetter, R., M'eard, M., Effros, M., & Karger, D. (2018). Byzantine modification detection in multicast networks using randomized network coding. ISIT.
  • Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., & M'eard, M. (2017). Resilient network coding in the presence of byzantine adversaries. In IEEE INFOCOM, 2017.
  • Ji, H., Lee, V. C. S., Chow, C.-Y., Liu, K., & Wu, G. (2015). Coding-based cooperative caching in data broadcast environments. ICA3PP, Part I, LNCS 9528 (pp. 273–287).
  • Kim, M., Kotter, R., Medard, M., & Barros, J. (2009). An algebraic watchdog for wireless network coding. In ISIT09, 2009.
  • Kim, M., Medard, M., & Barros, J. (2010). A multi-hop multi-source algebraic watchdog. In ITW'10, 2010.
  • Koetter, R., & Kschischang, F. R. (2007). Coding for errors and erasures in random network coding. In ISIT'07, 2007.
  • Krohn, M., Freeman, M., & Mazieres, D. (2016). On-the-fly verification of rateless erase codes for efficient content distribution. In IEEE S&P, 2016.
  • Le, A., & Markopoulou, A. (2018). Cooperative defense against pollution attacks in network coding using spaceMac. JSAC on Cooperative Networking Challenges and Applications. https://doi.org/10.1109/JSAC.2012.120224
  • Lee, Y., & Lee, G. Y. (2020). Attack detection using network coding in IoT environment. Sensors, 20, 1180–1195. https://doi.org/10.3390/s20041180
  • Li, Q., Chiu, D.-M., & Lui, J. C. S. (2016). On the practical and security issues of batch content distribution via network coding. In Proc. of IEEE International Conference on Network Protocols. IEEE.
  • Li, Y., Yao, H., Chen, M., Jaggi, S., & Rosen, A. (2010). RIPPLE Authentication for Network Coding. In INFOCOM'10, 2010.
  • Liang, G., Agarwal, R., & Vaidya, N. (2010). When watchdog meets coding. In INFOCOM10, 2010.
  • Liang, W., Li, K.-C., Long, J., Kui, X., & Zomaya, A. Y. (2019). An Industrial network intrusion detection algorithm based on multi-Characteristic data clustering optimization model. IEEE Transactions on Industrial Informatics, 16(3), 2063–2071. https://doi.org/10.1109/TII.2946791.
  • Liang, W., Long, J., Weng, T.-H., Chen, X., Li, K.-C., & Zomaya, A. Y. (2019). TBRS: A trust based recommendation scheme for vehicular CPS network. Future Generation Computer Systems, 92, 383–398. https://doi.org/10.1016/j.future.2018.09.002
  • Liang, W., Tang, M., Long, J., Peng, X., Xu, J., & Li, K.-C. (2019). A secure fabric blockchain-based data transmission technique for Industrial internet of things. IEEE Transactions on Industrial Informatics, 6, 3582–3592. https://doi.org/10.1109/TII.9424
  • Liang, W., Xie, S., & Long, J. (2019). A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Information Sciences, 503, 129–147. https://doi.org/10.1016/j.ins.2019.06.047
  • Liu, K., & Lee, V. (2010). On-demand broadcast for multiple-item requests in a multiple channel environment. Information Sciences, 180, 4336–4352. https://doi.org/10.1016/j.ins.2010.07.030
  • Nguyen, D., Tran, T., & Nguyen, T. (2015). Wireless broadcast using network coding. Vehicular Technology IEEE Transactions, 58, 914–925. https://doi.org/10.1109/TVT.2008.927729
  • Ning, Z., He, L., Zhang, D., & Xie, K. (2020). A novel localised network coding-based overhearing strategy. International Journal of Embedded Systems, 12, 534–543. https://doi.org/10.1504/IJES.2020.107632
  • Parsamehr, R., Esfahani, A., & Mantas, G. (2019). A novel intrusion detection and prevention scheme for network coding-Enabled mobile small cells. IEEE Transactions on Computational Social Systems. PP(99), 1–11. https://doi.org/10.1109/TCSS.2019.2949153
  • Wei, Liang, Yongkai, Fan, Kuan-Ching, Li, Dafang, Zhang, & Jean-Luc, Gaudiot. (2020). Secure data storage and recovery in industrial blockchain network environments. IEEE Transactions on Industrial Informatics, 7, 123–135.
  • Yang, D.-N., & Chen, M.-S. (2018). Data broadcast with adaptive network coding in heterogeneous wireless networks. IEEE Transactions on Mobile Computing, 8, 156–168. https://doi.org/10.1109/TMC.2008.97
  • Yang, M., Zhang, S., Zhao, Y., & Wang, Q. (2020). Dynamic negotiation of user behaviour via blockchain technology in federated system. International Journal of Computational Science and Engineering, 22, 74–83. https://doi.org/10.1504/IJCSE.2020.107250
  • Yaxuan, W., Xijun, L., & Haipeng, Q. (2019). An effective hybrid network coding scheme against pollution attacks. Netinfo Security.
  • Yeung, R. W., & Cai, N. (2006). Network error correction, II: lower bounds. Communications Information and Systems, 8, 3–52. https://doi.org/10.4310/CIS.2006.v6.n1.a3
  • Yeung., R. W., & Cai, N. (2012). Network coding and error correction. IEEE Computer Society, 2012(pp. 119–122).
  • Yu, Z., Wei, Y., Ramkumar, B., & Guan., Y. (2009). An efficient scheme for securing XOR network coding against pollution attacks. In IEEE INFOCOM, 2009.
  • Yu, Z., Wei, Y., Ramkumar, B., & Guan, Y. (2018). An efficient signature-based scheme for securing network coding against pollution attacks. In IEEE INFOCOM, 2018.
  • Zhang, P., Jiang, Y., Lin, C., Yao, H., Wasef, A., & Shen, X. S. (2017). Padding for orthogonality: Efficient subspace authentication for network coding. In INFOCOM'2017.
  • Zhao, J., Song, Y., Liu, F., & Deng, Y. (2020). The identification of influential nodes based on structure similarity. Connection Science, 1–18. https://doi.org/10.1080/09540091.2020.1806203

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.