On security against pollution attacks in network coding enabled 5g networks

VA Vasudevan, C Tselios, I Politis - IEEE Access, 2020 - ieeexplore.ieee.org
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …

[图书][B] Cyber-physical systems: from theory to practice

DB Rawat, JJPC Rodrigues, I Stojmenovic - 2015 - books.google.com
Although comprehensive knowledge of cyber-physical systems (CPS) is becoming a must
for researchers, practitioners, system designers, policy makers, system managers, and …

[HTML][HTML] Security engineering of patient-centered health care information systems in peer-to-peer environments: systematic review

I Abdullahi Yari, T Dehling, F Kluge, J Geck… - Journal of Medical …, 2021 - jmir.org
Background Patient-centered health care information systems (PHSs) enable patients to
take control and become knowledgeable about their own health, preferably in a secure …

SECRET—Secure network coding for reduced energy next generation mobile small cells: A European Training Network in wireless communications and networking …

J Rodriguez, A Radwan, C Barbosa… - 2017 Internet …, 2017 - ieeexplore.ieee.org
SECRET is a collaborative European Training Network (ETN) committed to create an
excellent educational training platform for Early Stage Researchers (ESRs) in the field of …

Cooperative defense against pollution attacks in network coding using spacemac

A Le, A Markopoulou - IEEE Journal on Selected Areas in …, 2012 - ieeexplore.ieee.org
Intra-session network coding is inherently vulnerable to pollution attacks. In this paper, first,
we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an …

An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks

A Esfahani, G Mantas, J Rodriguez… - International Journal of …, 2017 - Springer
Recent research efforts have shown that wireless networks can benefit from network coding
(NC) technology in terms of bandwidth, robustness to packet losses, delay and energy …

IDLP: An efficient intrusion detection and location-aware prevention mechanism for network coding-enabled mobile small cells

R Parsamehr, G Mantas, J Rodriguez… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile small cell technology is considered as a 5G enabling technology for delivering
ubiquitous 5G services in a cost-effective and energy efficient manner. Moreover, Network …

An efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC

A Esfahani, G Mantas… - IEEE Communications …, 2016 - ieeexplore.ieee.org
This letter proposes an efficient null space-based homomorphic message authentication
code scheme providing resistance against tag pollution attacks in random linear network …

TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding

C Cheng, T Jiang, Q Zhang - IEEE Journal on Selected Areas …, 2013 - ieeexplore.ieee.org
Recently, the peer-to-peer (P2P) live streaming system has benefited from the advent of
network coding. However, it was demonstrated that malicious nodes could significantly …

Online decentralized multi-agents meta-learning with Byzantine resiliency

OT Odeyomi, B Ude, K Roy - IEEE Access, 2023 - ieeexplore.ieee.org
Meta-learning is a learning-to-learn paradigm that leverages past learning experiences for
quick adaptation to new learning tasks. It has a wide application, such as in few-shot …