16th International Conference on Advanced Communication Technology 2014
DOI: 10.1109/icact.2014.6779160
|View full text |Cite
|
Sign up to set email alerts
|

A MAC-based scheme for multi-generation content distribution with network coding

Yu Zhang

Abstract: Abstract-The system that uses network coding is highly susceptible to pollution attacks, where a malicious node may pollute a small number of packets with the purpose of preventing the recipient nodes from reconstructing the original messages properly. Some schemes that use Message Authentication Code (MAC) have been proposed for resisting this attack. However, these schemes could be broken with probability 1/q, where q is the size of the underlying field. Although the trace function has already been used for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Then intermediate nodes linearly combine packets from the same file and send the resulting "new" vector (or packet) to its outgoing links. If there is no error during the transmission, all the packets in the network are linear combinations of the m original augmented packets 12 , , , .…”
Section: B Network Codingmentioning
confidence: 99%
See 1 more Smart Citation
“…Then intermediate nodes linearly combine packets from the same file and send the resulting "new" vector (or packet) to its outgoing links. If there is no error during the transmission, all the packets in the network are linear combinations of the m original augmented packets 12 , , , .…”
Section: B Network Codingmentioning
confidence: 99%
“…the packets (or vectors) transmitted among the nodes must belong to one file (or linear space)). However, in this situation, the corresponding homomorphic MAC scheme is susceptible to repetitive attacks [12].…”
mentioning
confidence: 99%