2011
DOI: 10.1002/cpe.1767
|View full text |Cite
|
Sign up to set email alerts
|

Energy efficient authentication strategies for network coding

Abstract: SUMMARY Recent advances in information theory and networking, e.g. aggregation, network coding or rateless codes, have significantly modified data dissemination in wireless networks. These new paradigms create new threats for security such as pollution attacks and denial of services (DoS). These attacks exploit the difficulty to authenticate data in such contexts. The particular case of xor network coding is considered herein. We investigate different strategies based on message authentication codes algorithms… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 46 publications
(66 reference statements)
0
3
0
Order By: Relevance
“…It is possible to mitigate pollution attacks with advanced message authentication strategies [4] but at the cost of complex cryptographic operations. Thus, installing a secure network coding AP is even more expensive than solely installing a network coding AP.…”
Section: A Cost-efficient and Secure De-signmentioning
confidence: 99%
See 1 more Smart Citation
“…It is possible to mitigate pollution attacks with advanced message authentication strategies [4] but at the cost of complex cryptographic operations. Thus, installing a secure network coding AP is even more expensive than solely installing a network coding AP.…”
Section: A Cost-efficient and Secure De-signmentioning
confidence: 99%
“…It spreads the pollution by combining legitimate messages with polluted ones and therefore limiting the recovery probability of legitimate messages [10]. It is possible to mitigate pollution attacks with advanced message authentication strategies but at the cost of complex cryptographic operations [4] requiring sophisticated and more expensive hardware.…”
Section: Introductionmentioning
confidence: 99%
“…In the fourth paper, ‘Energy efficient authentication strategies for network coding’ , Apavatjrut et al investigate different strategies based on message authentication codes algorithms to deal with the attacks against network coding schemes. In wireless sensor networks, the node resources are limited in energy and in computational power.…”
mentioning
confidence: 99%