2010 Proceedings IEEE INFOCOM 2010
DOI: 10.1109/infcom.2010.5462050
|View full text |Cite
|
Sign up to set email alerts
|

P-Coding: Secure Network Coding against Eavesdropping Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 78 publications
(33 citation statements)
references
References 17 publications
0
33
0
Order By: Relevance
“…Permutation encryption scheme [2] P-coding which is more efficient and assures confidentially. The basic idea of this scheme is permutation encryption is applied on each packet before performing network coding operations.…”
Section: Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…Permutation encryption scheme [2] P-coding which is more efficient and assures confidentially. The basic idea of this scheme is permutation encryption is applied on each packet before performing network coding operations.…”
Section: Problem Statementmentioning
confidence: 99%
“…Cryptographic scheme [2] provides sharing of secret key between authenticated sender and receiver. It is the straight forward method to provide confidentiality for network coded MANETs is to encrypt the data packet using symmetric encryption algorithm, so that we can achieve confidentiality, integrity, non-repudiation, authentication and availability.…”
Section: Introductionmentioning
confidence: 99%
“…Since anyone can recover the source messages by Gauss elimination after collecting enough number of coded messages,Thus we employee the mpartial permutation encryption [12] based secure coding scheme to encrypt the GEV. The permutation encryption function can be defined as a permuting operation on the input symbols…”
Section: Anonymous Neighbor Authentication and Key Agreement Phasementioning
confidence: 99%
“…Network Coding [7][8][9] offers an elegant solution to achieve data confidentiality and flow untraceability against eavesdropping and traffic analysis attacks. Recent researches prove that network coding not only brings performance benefits, but also provide a feasible way to achieve security and privacy preservation [10][11][12][13][14][15]. The coding/mixing mechanism provided by network coding can effectively resist traffic analysis attack: each message is trimmed into equal size, intermediate nodes buffer received incoming messages instead of forwarding instantly, and each outgoing message is the result of linear combine on multiple incoming messages.…”
Section: Introductionmentioning
confidence: 99%
“…Y. Fan et al [34] and P. Zhang et al [35] propose the novel schemes to secure network coding against traffic analysis attacks and eavesdropping attacks, respectively. But these schemes can not be directly applied to sensor data storage, since they only focus on the integrity and privacy assurances in the data distribution, not including the data availability guarantee.…”
Section: H Comparisons With Other Schemesmentioning
confidence: 99%