2016
DOI: 10.1007/s10207-016-0351-z
|View full text |Cite
|
Sign up to set email alerts
|

An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
43
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 37 publications
(43 citation statements)
references
References 21 publications
0
43
0
Order By: Relevance
“…The study goes one step further by introducing the concept of block chains as a novel solution for efficient key distribution mechanism. A comparison with well studied network coding schemes MacSig [13] and Dual HMAC [14] indicate that the proposed block chain enhanced secure network coding scheme reduces the computational complexity and the communication overhead significantly.…”
Section: Introductionmentioning
confidence: 99%
“…The study goes one step further by introducing the concept of block chains as a novel solution for efficient key distribution mechanism. A comparison with well studied network coding schemes MacSig [13] and Dual HMAC [14] indicate that the proposed block chain enhanced secure network coding scheme reduces the computational complexity and the communication overhead significantly.…”
Section: Introductionmentioning
confidence: 99%
“…This method allows the system to check the integrity of network coded data and also to track and find malicious nodes in the network. However, due to high processing cost, this method is not practical [6]. While there exist alternatives for preventing pollution attacks with reduced processing costs, these solutions place limitations on topologies, require loose clock synchronization on the order of 100 ms, limit the hop count, require large field sizes or demand new public keys to be generated per generation.…”
Section: Introductionmentioning
confidence: 99%
“…A pollution attack occurs when a malicious or faulty node injects invalid linear combinations of generation into the network [5]. These invalid coded packets can quickly propagate into other packets via recoding in relay nodes and can prevent the destination node from decoding properly [6]. To prevent pollution attacks, homomorphic signatures, which are preserved through linear combination and recoding, can be used [7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…To prevent them, homomorphic signatures, which are preserved through linear combination and recoding, can be used [4] [5] [7]. These method allow the system to check integrity of network coded data and to track and find malicious nodes in the network However, due to high processing cost, this method is not practical [11]. While there exists alternatives for preventing pollution attacks with reduced processing costs, these solutions place limitations on topologies, require loose clock synchronization on the order of 100 ms, limit the hop count, require large field sizes or demand new public keys generated per generation.…”
Section: Introductionmentioning
confidence: 99%
“…A pollution attack occurs when a malicious or faulty node injects invalid linear combinations of generation into the network [16]. These invalid coded packets can quickly propagate into other packets via recoding in relay nodes and can prevent destination node from decoding properly [11]. To prevent them, homomorphic signatures, which are preserved through linear combination and recoding, can be used [4] [5] [7].…”
Section: Introductionmentioning
confidence: 99%