References
- Adat, V., Tselios, C., & Tselios, I. (2020). On security against pollution attacks in network coding enabled 5G networks. IEEE Access, 9, 1–15. https://doi.org/10.1109/ACCESS.2020.2975761
- Agrawal, S., Boneh, D., Boyen, X., & Freeman, D. (2010). Preventing pollution attacks in multi-source network coding. In PKC'10,O 2010.
- Ahlswede, R., Cai, N., & Li, S. Y. (2000). Network information flow. IEEE Trans on Information Theory, 46, 1204–1216. https://doi.org/10.1109/18.850663
- Awerbuch, B., Holmer, D., Rotaru, C. N-., & Rubens, H. (2002). An on-demand secure routing protocol resilient to byzantine failures. In Proc. of the 1st ACM Workshop on Wireless security (WiSe'02). ACM Press.
- Barros, R. (2012). Global mobile information systems simulation library -- glomosim. Retrieved from http://pcl.cs.ucla.edu/projects/glomosim/.
- Cai, N., & Yeung, R. W. (2002). Secure network coding. In ISIT'02, 2002.
- Charles, D., Jian, K., & Lauter, K. (2015). Signature for network coding (Technique Report, Report No. MSR-TR-2015-159).
- Damiani, E., Vimercati, D. C., Paraboschi, S., Samarati, P., & Violante, F. (2012). A reputation-based approach for choosing reliable resources in peer-to-peer networks. In CCS'12, 2012.
- Dong, J., Curtmola, R., & Nita-Rotaru, C. (2018). Pollution attacks and defenses in wireless interflow network coding systems. IEEE Transactions on Dependable & Secure Computing, 9, 741–755. https://doi.org/10.1109/TDSC.2012.39
- Gayathri, R., & Maria Sofi Anusuya, J. (2018). Preventing Malicious node and provide secure routing in manet. IOSR Journal of Electronics and Communication Engineering, 10, 09–13.
- Gu, G., Zhang, J., & Lee, W. (2018). BotSniffer: Detecting botnet command and control channels in network traffic. In NDSS'18, 2018.
- Ho, T., Koetter, R., Medard, M., Karger, D., & Effros, M. (2013). The benefits of coding over routing in a randomized settings. ISIT'03 (pp. 203–212).
- Ho, T., Leong, B., Koetter, R., M'eard, M., Effros, M., & Karger, D. (2018). Byzantine modification detection in multicast networks using randomized network coding. ISIT.
- Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., & M'eard, M. (2017). Resilient network coding in the presence of byzantine adversaries. In IEEE INFOCOM, 2017.
- Ji, H., Lee, V. C. S., Chow, C.-Y., Liu, K., & Wu, G. (2015). Coding-based cooperative caching in data broadcast environments. ICA3PP, Part I, LNCS 9528 (pp. 273–287).
- Kim, M., Kotter, R., Medard, M., & Barros, J. (2009). An algebraic watchdog for wireless network coding. In ISIT09, 2009.
- Kim, M., Medard, M., & Barros, J. (2010). A multi-hop multi-source algebraic watchdog. In ITW'10, 2010.
- Koetter, R., & Kschischang, F. R. (2007). Coding for errors and erasures in random network coding. In ISIT'07, 2007.
- Krohn, M., Freeman, M., & Mazieres, D. (2016). On-the-fly verification of rateless erase codes for efficient content distribution. In IEEE S&P, 2016.
- Le, A., & Markopoulou, A. (2018). Cooperative defense against pollution attacks in network coding using spaceMac. JSAC on Cooperative Networking Challenges and Applications. https://doi.org/10.1109/JSAC.2012.120224
- Lee, Y., & Lee, G. Y. (2020). Attack detection using network coding in IoT environment. Sensors, 20, 1180–1195. https://doi.org/10.3390/s20041180
- Li, Q., Chiu, D.-M., & Lui, J. C. S. (2016). On the practical and security issues of batch content distribution via network coding. In Proc. of IEEE International Conference on Network Protocols. IEEE.
- Li, Y., Yao, H., Chen, M., Jaggi, S., & Rosen, A. (2010). RIPPLE Authentication for Network Coding. In INFOCOM'10, 2010.
- Liang, G., Agarwal, R., & Vaidya, N. (2010). When watchdog meets coding. In INFOCOM10, 2010.
- Liang, W., Li, K.-C., Long, J., Kui, X., & Zomaya, A. Y. (2019). An Industrial network intrusion detection algorithm based on multi-Characteristic data clustering optimization model. IEEE Transactions on Industrial Informatics, 16(3), 2063–2071. https://doi.org/10.1109/TII.2946791.
- Liang, W., Long, J., Weng, T.-H., Chen, X., Li, K.-C., & Zomaya, A. Y. (2019). TBRS: A trust based recommendation scheme for vehicular CPS network. Future Generation Computer Systems, 92, 383–398. https://doi.org/10.1016/j.future.2018.09.002
- Liang, W., Tang, M., Long, J., Peng, X., Xu, J., & Li, K.-C. (2019). A secure fabric blockchain-based data transmission technique for Industrial internet of things. IEEE Transactions on Industrial Informatics, 6, 3582–3592. https://doi.org/10.1109/TII.9424
- Liang, W., Xie, S., & Long, J. (2019). A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Information Sciences, 503, 129–147. https://doi.org/10.1016/j.ins.2019.06.047
- Liu, K., & Lee, V. (2010). On-demand broadcast for multiple-item requests in a multiple channel environment. Information Sciences, 180, 4336–4352. https://doi.org/10.1016/j.ins.2010.07.030
- Nguyen, D., Tran, T., & Nguyen, T. (2015). Wireless broadcast using network coding. Vehicular Technology IEEE Transactions, 58, 914–925. https://doi.org/10.1109/TVT.2008.927729
- Ning, Z., He, L., Zhang, D., & Xie, K. (2020). A novel localised network coding-based overhearing strategy. International Journal of Embedded Systems, 12, 534–543. https://doi.org/10.1504/IJES.2020.107632
- Parsamehr, R., Esfahani, A., & Mantas, G. (2019). A novel intrusion detection and prevention scheme for network coding-Enabled mobile small cells. IEEE Transactions on Computational Social Systems. PP(99), 1–11. https://doi.org/10.1109/TCSS.2019.2949153
- Wei, Liang, Yongkai, Fan, Kuan-Ching, Li, Dafang, Zhang, & Jean-Luc, Gaudiot. (2020). Secure data storage and recovery in industrial blockchain network environments. IEEE Transactions on Industrial Informatics, 7, 123–135.
- Yang, D.-N., & Chen, M.-S. (2018). Data broadcast with adaptive network coding in heterogeneous wireless networks. IEEE Transactions on Mobile Computing, 8, 156–168. https://doi.org/10.1109/TMC.2008.97
- Yang, M., Zhang, S., Zhao, Y., & Wang, Q. (2020). Dynamic negotiation of user behaviour via blockchain technology in federated system. International Journal of Computational Science and Engineering, 22, 74–83. https://doi.org/10.1504/IJCSE.2020.107250
- Yaxuan, W., Xijun, L., & Haipeng, Q. (2019). An effective hybrid network coding scheme against pollution attacks. Netinfo Security.
- Yeung, R. W., & Cai, N. (2006). Network error correction, II: lower bounds. Communications Information and Systems, 8, 3–52. https://doi.org/10.4310/CIS.2006.v6.n1.a3
- Yeung., R. W., & Cai, N. (2012). Network coding and error correction. IEEE Computer Society, 2012(pp. 119–122).
- Yu, Z., Wei, Y., Ramkumar, B., & Guan., Y. (2009). An efficient scheme for securing XOR network coding against pollution attacks. In IEEE INFOCOM, 2009.
- Yu, Z., Wei, Y., Ramkumar, B., & Guan, Y. (2018). An efficient signature-based scheme for securing network coding against pollution attacks. In IEEE INFOCOM, 2018.
- Zhang, P., Jiang, Y., Lin, C., Yao, H., Wasef, A., & Shen, X. S. (2017). Padding for orthogonality: Efficient subspace authentication for network coding. In INFOCOM'2017.
- Zhao, J., Song, Y., Liu, F., & Deng, Y. (2020). The identification of influential nodes based on structure similarity. Connection Science, 1–18. https://doi.org/10.1080/09540091.2020.1806203