Ieee Infocom 2009 2009
DOI: 10.1109/infcom.2009.5062146
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 75 publications
(45 citation statements)
references
References 22 publications
0
45
0
Order By: Relevance
“…The authors classify adversaries having a partial view of the network as local adversaries while those ones having a total view of the network as global adversaries. An example solution against global attackers is the use of Network Coding [7] which have the disadvantage of increasing complexity in the sensing nodes. Most of the solutions proposed defend the network against local adversaries using techniques such as random walk [8], cyclic entrapment [9], delaying the packet [10] or limiting node detectability [3,11].…”
Section: Related Workmentioning
confidence: 99%
“…The authors classify adversaries having a partial view of the network as local adversaries while those ones having a total view of the network as global adversaries. An example solution against global attackers is the use of Network Coding [7] which have the disadvantage of increasing complexity in the sensing nodes. Most of the solutions proposed defend the network against local adversaries using techniques such as random walk [8], cyclic entrapment [9], delaying the packet [10] or limiting node detectability [3,11].…”
Section: Related Workmentioning
confidence: 99%
“…(13) the node selects the next hop node based on ( , ) ( = ). (14) end for (15) the node sends the packets to the node (16) end while (17) …”
Section: The Limited Range Of the Pheromones-based Eelpmentioning
confidence: 99%
“…Fan et al [21] preserve location privacy by using homomorphic encryption operations to prevent traffic analysis in network coding. In [22], each cluster header can filter the dummy packets received from the sensor nodes of its cluster to reduce the number of dummy packets.…”
Section: Related Workmentioning
confidence: 99%