A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Short Signatures from the Weil Pairing
Journal of Cryptology
Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Overcoming untuned radios in wireless networks with network coding
IEEE/ACM Transactions on Networking (TON) - Special issue on networking and information theory
XORs in the air: practical wireless network coding
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
On the Practical and Security Issues of Batch Content Distribution Via Network Coding
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
BAT: a robust signature scheme for vehicular networks using binary authentication tree
IEEE Transactions on Wireless Communications
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
A Random Linear Network Coding Approach to Multicast
IEEE Transactions on Information Theory
Byzantine Modification Detection in Multicast Networks With Random Network Coding
IEEE Transactions on Information Theory
Multicast with network coding in application-layer overlay networks
IEEE Journal on Selected Areas in Communications
An efficient dynamic-identity based signature scheme for secure network coding
Computer Networks: The International Journal of Computer and Telecommunications Networking
Remote data checking for network coding-based distributed storage systems
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Entropy attacks and countermeasures in wireless network coding
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Compressed error and erasure correcting codes via rank-metric codes in random network coding
International Journal of Communication Systems
Hi-index | 0.00 |
In this paper, based on a novel self-adaptive probabilistic subset linear-dependency detection (S-PSLD) algorithm, we propose an efficient packet filtering scheme against entropy attacks in network coding. The scheme verifies the received packets probabilistically instead of exactly, and thus it can rapidly filter out the resultant packets from entropy attacks. Moreover, to minimize the packet detection cost at forwarder while keeping the false positive rate at an expected low level, a self-adaptive algorithm is introduced such that each forwarder can dynamically tune the system security parameters according to the available bandwidth or the number of the received packets in buffer. Theoretical analysis and performance evaluation are given to demonstrate the validity and efficiency of the proposed scheme.