In INFOCOM 2009, Yu, Wei, Ramkumar and Guan have proposed the novel mechanism (called Yu’s scheme), in which a forwarder can filter polluted messages before spreading the pollution in the XOR network coding systems. In order to perform such filtering, two or more message authentication codes (MACs) are used for this scheme. However, Yu’s scheme has a problem that the number of MACs increases at every coding point, since it cannot operate MACs with the XOR network coding. This means that the MAC of Yu’s scheme does not have homomorphic property. In this paper, we propose the first symmetric-key-based scheme not only to filter polluted messages but also to operate MACs with the XOR networ coding on a forwarder. The XOR network coding of MACs ...
Abstract — Network coding provides the possibility to maxi-mize network throughput and receives vari...
While existing solutions can provide authentication services, they are insufficient for a new genera...
A wireless sensor network (WSN) commonly requires lower level security for public information gather...
International audienceThe recent advances in information theory and networking have significantly mo...
International audienceRecent advances in information theory and networking, e.g. aggregation, networ...
Network coding has shown a considerable improvement in terms of capacity and robustness compared to ...
Network coding has shown a considerable improvement in terms of capacity and robustness compared to ...
Wireless sensor network (WSN) is a kind of energy-constrained network. If any fake communication req...
Abstract — Compromised senders and pollution attacks are the key issues in designing and operating i...
Recent research efforts have shown that wireless networks can benefit from network coding (NC) techn...
[[abstract]]In recent years, wireless sensor networks (WSN) have received a lot of attention and sev...
Network Coding has significantly shown the achievable throughput and robustness in wireless Networks...
International audienceThis paper formulates the authentication planning problem when network coding ...
Wireless Body Area Networks (WBANs) play a pivotal role to remote patient monitoring which is one of...
To provide security for data gathering based on network coding in wireless sensor networks (WSNs), a...
Abstract — Network coding provides the possibility to maxi-mize network throughput and receives vari...
While existing solutions can provide authentication services, they are insufficient for a new genera...
A wireless sensor network (WSN) commonly requires lower level security for public information gather...
International audienceThe recent advances in information theory and networking have significantly mo...
International audienceRecent advances in information theory and networking, e.g. aggregation, networ...
Network coding has shown a considerable improvement in terms of capacity and robustness compared to ...
Network coding has shown a considerable improvement in terms of capacity and robustness compared to ...
Wireless sensor network (WSN) is a kind of energy-constrained network. If any fake communication req...
Abstract — Compromised senders and pollution attacks are the key issues in designing and operating i...
Recent research efforts have shown that wireless networks can benefit from network coding (NC) techn...
[[abstract]]In recent years, wireless sensor networks (WSN) have received a lot of attention and sev...
Network Coding has significantly shown the achievable throughput and robustness in wireless Networks...
International audienceThis paper formulates the authentication planning problem when network coding ...
Wireless Body Area Networks (WBANs) play a pivotal role to remote patient monitoring which is one of...
To provide security for data gathering based on network coding in wireless sensor networks (WSNs), a...
Abstract — Network coding provides the possibility to maxi-mize network throughput and receives vari...
While existing solutions can provide authentication services, they are insufficient for a new genera...
A wireless sensor network (WSN) commonly requires lower level security for public information gather...