Handbook of Applied Cryptography
Handbook of Applied Cryptography
Network coding for efficient communication in extreme networks
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
XORs in the air: practical wireless network coding
IEEE/ACM Transactions on Networking (TON)
Security based on network topology against the wiretapping attack
IEEE Wireless Communications
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
A Random Linear Network Coding Approach to Multicast
IEEE Transactions on Information Theory
Random linear network coding for peer-to-peer applications
IEEE Network: The Magazine of Global Internetworking
A source authentication scheme using network coding
International Journal of Security and Networks
Secret Error Control Codes Against Malicious Attacks in Random Multisource Network Coding
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Though providing an intrinsic secrecy, network coding is still vulnerable to eavesdropping attacks, by which an adversary may compromise the confidentiality of message content. Existing studies mainly deal with eavesdroppers that can intercept a limited number of packets. However, real scenarios often consist of more capable adversaries, e.g., global eavesdroppers, which can defeat these techniques. In this paper, we propose P-Coding, a novel security scheme against eavesdropping attacks in network coding. With the lightweight permutation encryption performed on each message and its coding vector, P-Coding can efficiently thwart global eavesdroppers in a transparent way. Moreover, P-Coding is also featured in scalability and robustness, which enable it to be integrated into practical network coded systems. Security analysis and simulation results demonstrate the efficacy and efficiency of the P-Coding scheme.