2011 Proceedings IEEE INFOCOM 2011
DOI: 10.1109/infcom.2011.5934876
|View full text |Cite
|
Sign up to set email alerts
|

Padding for orthogonality: Efficient subspace authentication for network coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
130
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 75 publications
(130 citation statements)
references
References 22 publications
0
130
0
Order By: Relevance
“…Potential threats such as pollution attacks, eavesdropping attacks, traffic analysis attacks, entropy attacks are treated in [18]- [21], respectively. However, for the wireless network coding paradigm, e.g., COPE, little attention have been paid to addressing its privacy vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Potential threats such as pollution attacks, eavesdropping attacks, traffic analysis attacks, entropy attacks are treated in [18]- [21], respectively. However, for the wireless network coding paradigm, e.g., COPE, little attention have been paid to addressing its privacy vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…However, Yun et al demonstrate that Yu et al's scheme does not satisfy the required homomorphic property in [33]. Some schemes (e.g., the homomorphic hashing scheme, the MAC-based scheme, the dynamic-identity based signature scheme, and the efficient subspace authentication [27], [28], [29], [30]) have been proposed against pollution attacks for network coding and erasure codes. Y.…”
Section: H Comparisons With Other Schemesmentioning
confidence: 99%
“…For instance, erasure codes (e.g., Reed-Solomon codes [10]), fountain codes (e.g., LT codes [7]), growth codes [5], and priority linear codes [11] have been proposed in the recent years. In addition, some schemes are proposed to provide the integrity guarantee for network coding or erasure codes [26], [27], [29], [30], but the data maintenance issue is not addressed in these schemes. There are also some secure data storage schemes which include the secure data access approach with polynomial-key management, the adaptive polynomialbased data storage scheme, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Cheng et al [12] proposed a homomorphic MAC scheme which can achieve a higher security level using the same field size. However, it does not support multi-generation transmission and is susceptible to repetitive attacks [14]. A repetitive attack is when transmissions contains multiple generations [3], a malicious node collect the legitimate packets from previous generations and use them to forge packets for current or subsequence generations.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the way the packets are combined and transmitted, a small number of polluted packets can cause large-scale pollution propagation. To solve the problem, several public-key based schemes [5]-[8] and hybrid [14][15] schemes are proposed. In these schemes, the source node signs the packet using a private key.…”
mentioning
confidence: 99%