Articles with "pollution attacks" as a keyword



Universal resource allocation framework for preventing pollution attacks in network-coded wireless mesh networks

Sign Up to like & get
recommendations!
Published in 2020 at "Ad Hoc Networks"

DOI: 10.1016/j.adhoc.2020.102073

Abstract: Abstract In network-coded wireless mesh networks, pollution attacks cause severe disruption to data transmission. Existing schemes to combat pollution attacks only focus on defensive performance but ignore their resource consumption. In this paper, we investigate… read more here.

Keywords: network coded; network; pollution; framework ... See more keywords
Photo by dawson2406 from unsplash

Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2926401

Abstract: Recently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message authentication code (MAC) scheme for the random linear network coding (RLNC) to resist tag pollution attacks (TPAs), and also presented the security analysis. As Esfahani et… read more here.

Keywords: pollution attacks; security analysis; homomorphic mac; security ... See more keywords