An algebraic approach to network coding
IEEE/ACM Transactions on Networking (TON)
Network coding: an instant primer
ACM SIGCOMM Computer Communication Review
XORs in the air: practical wireless network coding
IEEE/ACM Transactions on Networking (TON)
Homomorphic MACs: MAC-Based Integrity for Network Coding
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
An efficient dynamic-identity based signature scheme for secure network coding
Computer Networks: The International Journal of Computer and Telecommunications Networking
Performance of network coding for ad hoc networks in realistic simulation scenarios
ICT'09 Proceedings of the 16th international conference on Telecommunications
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Tiered authentication of multicast traffic in wireless ad-hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
P-coding: secure network coding against eavesdropping attacks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Performance of network coding in ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
EasiSec: a SoC security coprocessor based on fingerprint-based key management for WSN
International Journal of Sensor Networks
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Hi-index | 0.01 |
In this paper, we explore the security merits of network coding and potential trade-offs with the widely accepted throughput benefits, especially in multicast scenarios. In particular, we propose a novel Source Authentication using Network Coding (SANC) scheme. Towards this objective, we propose a general framework for embedding the authentication information within the network coding Global Encoding Vector. First, we illustrate the proposed concept using a simple mapping function. Second, we present a detailed security analysis that reveals the security merits of the proposed scheme, contrasted against two baseline schemes. Finally, we present simulation results pertaining to the network coding performance.