Skip to main content

Introduction

  • Chapter
  • First Online:
Security in Network Coding

Part of the book series: Wireless Networks ((WN))

Abstract

Network coding [2] has been recognized as a significant improvement over the Shannon information transmission model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Acedanski, S., Deb, S., Médard, M., Koetter, R.: How good is random linear coding based distributed networked storage. In: Proceedings of International Workshop on Network Coding, Theory and Applications (NetCod) (2005)

    Google Scholar 

  2. Ahlswede, R., Cai, N., Li, S.Y., Yeung, R.W.: Network information flow. IEEE Trans. Inf. Theory 46(4), 1204–1216 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  3. Ballani, H., Francis, P., Zhang, X.: A study of prefix hijacking and interception in the internet. ACM SIGCOMM Comput. Commun. Rev. 37(4), 265–276 (2007)

    Article  Google Scholar 

  4. Biswas, S., Morris, R.: Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Comput. Commun. Rev. 34(1), 69–74 (2004)

    Article  Google Scholar 

  5. Chachulski, S., Jennings, M., Katti, S., Katabi, D.: Trading structure for randomness in wireless opportunistic routing. ACM SIGCOMM Comput. Commun. Rev. 37(4), 169–180 (2007)

    Article  Google Scholar 

  6. Chou, P.A., Wu, Y.: Network coding for the internet and wireless networks. IEEE Signal Process. Mag. 24(5), 77–85 (2007)

    Article  Google Scholar 

  7. Dimakis, A.G., Godfrey, P.B., Wu, Y., Wainwright, M.J., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theory 56(9), 4539–4551 (2010)

    Article  Google Scholar 

  8. Fragouli, C., Markopoulou, A.: A network coding approach to network monitoring. In: Proceedings of the 43rd Allerton Conference on Communication, Control, and Computing (2005)

    Google Scholar 

  9. Fragouli, C., Soljanin, E.: Network Coding Applications. Now Pub, Hanover (2008)

    MATH  Google Scholar 

  10. Fragouli, C., Widmer, J., Boudec, J.: A network coding approach to energy efficient broadcasting: from theory to practice. In: Proceedings of IEEE INFOCOM (2006)

    Google Scholar 

  11. Gkantsidis, C., Rodriguez, P.R.: Network coding for large scale content distribution. In: Proceedings of IEEE INFOCOM, pp. 2235–2245 (2005)

    Google Scholar 

  12. Gkantsidis, C., Rodriguez, P.: Cooperative security for network coding file distribution. In: Proceedings of IEEE INFOCOM, vol. 6, pp. 1–13 (2006)

    Google Scholar 

  13. Ho, T., Leong, B., Chang, Y.H., Wen, Y., Koetter, R.: Network monitoring in multicast networks using network coding. In: Proceedings of International Symposium on Information Theory (ISIT), pp. 1977–1981. IEEE, Adelaide (2005)

    Google Scholar 

  14. Ho, T., Médard, M., Koetter, R., Karger, D.R., Effros, M., Shi, J., Leong, B.: A random linear network coding approach to multicast. IEEE Trans. Inf. Theory 52(10), 4413–4430 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  15. Hu, Y., Chen, H.C., Lee, P.P., Tang, Y.: Nccloud: applying network coding for the storage repair in a cloud-of-clouds. In: Proceedings of USENIX FAST (2012)

    Google Scholar 

  16. Jaggi, S., Sanders, P., Chou, P.A., Effros, M., Egner, S., Jain, K., Tolhuizen, L.M.: Polynomial time algorithms for multicast network code construction. IEEE Trans. Inf. Theory 51(6), 1973–1982 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  17. Jiang, Y., Fan, Y., Shen, X., Lin, C.: A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding. Comput. Netw. 53(18), 3089–3101 (2009)

    Article  MATH  Google Scholar 

  18. Katti, S., Katabi, D., Balakrishnan, H., Medard, M.: Symbol-level network coding for wireless mesh networks. ACM SIGCOMM Comput. Commun. Rev. 38(4), 401–412 (2008)

    Article  Google Scholar 

  19. Katti, S., Rahul, H., Hu, W., Katabi, D., Médard, M., Crowcroft, J.: Xors in the air: practical wireless network coding. ACM SIGCOMM Comput. Commun. Rev. 36(4), 243–254 (2006)

    Article  Google Scholar 

  20. Koetter, R., Médard, M.: An algebraic approach to network coding. IEEE/ACM Trans. Netw. 11(5), 782–795 (2003)

    Article  Google Scholar 

  21. Li, L., Ramjee, R., Buddhikot, M., Miller, S.: Network coding-based broadcast in mobile ad-hoc networks. In: Proceedings of IEEE INFOCOM (2007)

    Book  Google Scholar 

  22. Li, S.Y., Yeung, R.W., Cai, N.: Linear network coding. IEEE Trans. Inf. Theory 49(2), 371–381 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  23. Lin, Y., Liang, B., Li, B.: Passive loss inference in wireless sensor networks based on network coding. In: Proceedings of IEEE INFOCOM, pp. 1809–1817 (2009)

    Google Scholar 

  24. Liu, Z., Wu, C., Li, B., Zhao, S.: Uusee: Large-scale operational on-demand streaming with random network coding. In: Proceedings of IEEE INFOCOM, pp. 1–9 (2010)

    Google Scholar 

  25. Lun, D.S., Médard, M., Koetter, R., Effros, M.: Further results on coding for reliable communication over packet networks. In: Proceedings of International Symposium on Information Theory (ISIT), pp. 1848–1852 (2005)

    Google Scholar 

  26. Lun, D.S., Médard, M., Koetter, R., Effros, M.: On coding for reliable communication over packet networks. Phys. Commun. 1(1), 3–20 (2008)

    Article  Google Scholar 

  27. Oliveira, P.F., Barros, J.: A network coding approach to secret key distribution. IEEE Trans. Inf. Forensics Secur. 3(3), 414–423 (2008)

    Article  Google Scholar 

  28. Park, K., Lee, H.: On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets. ACM SIGCOMM Comput. Commun. Rev. 31(4), 15–26 (2001)

    Article  Google Scholar 

  29. Saltzer, J.H., Reed, D.P., Clark, D.D.: End-to-end arguments in system design. ACM Trans. Comput. Syst. 2(4), 277–288 (1984)

    Article  Google Scholar 

  30. Wang, M., Li, B.: R2: Random push with random network coding in live peer-to-peer streaming. IEEE J. Sel. Areas Commun. 25(9), 1655–1666 (2007)

    Article  Google Scholar 

  31. Wu, Y., Chou, P.A., Kung, S.Y.: Minimum-energy multicast in mobile ad hoc networks using network coding. IEEE Trans. Commun. 53(11), 1906–1918 (2005)

    Article  Google Scholar 

  32. Yao, H., Jaggi, S., Chen, M.: Network coding tomography for network failures. In: Proceedings of IEEE INFOCOM, pp. 1–5 (2010)

    Google Scholar 

  33. Zeng, R., Jiang, Y., Lin, C., Fan, Y., Shen, X.S.: A scalable and robust key pre-distribution scheme with network coding for sensor data storage. Comput. Netw. 55(10), 2534–2544 (2011)

    Article  Google Scholar 

  34. Zhang, S., Liew, S.C., Lam, P.P.: Hot topic: physical-layer network coding. In: Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, pp. 358–365 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Zhang, P., Lin, C. (2016). Introduction. In: Security in Network Coding. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-31083-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31083-1_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31082-4

  • Online ISBN: 978-3-319-31083-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics