Abstract
Network coding is a new transmission paradigm in communication networks. Different from traditional transmission mechanisms where in-network nodes only store and forward packets, network coding allows them to perform coding on packets. Benefits of network coding include enhanced data throughput, lower energy consumption, easier node coordination, reduced bandwidth cost, etc. Up to now, network coding has been applied to various kinds of networks, e.g., wireless networks, content distribution networks, distributed storage networks, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dean, D., Franklin, M., Stubblefield, A.: An algebraic approach to ip traceback. ACM Trans. Inf. Syst. Secur. 5(2), 119–137 (2002)
Kim, M., Medard, M., Barros, J.: Algebraic watchdog: mitigating misbehavior in wireless network coding. IEEE J. Sel. Areas Commun. 29(10), 1916–1925 (2011)
Le, A., Markopoulou, A.: Locating byzantine attackers in intra-session network coding using spacemac. In: Proceedings of International Symposium on Network Coding (NetCod), pp. 1–6 (2010)
Le, A., Markopoulou, A.: Cooperative defense against pollution attacks in network coding using spacemac. IEEE J. Sel. Areas Commun. 30(2), 442–449 (2012)
Marti, S., Giuli, T.J., Lai, K., Baker, M., et al.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (Mobicom), pp. 255–265 (2000)
Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical network support for ip traceback. In: Proceedings of ACM SIGCOMM, pp. 295–306 (2000)
Siavoshani, M.J., Fragouli, C., Diggavi, S.: On locating byzantine attackers. In: Proceedings of the Fourth Workshop on Network Coding, Theory and Applications (NetCod), pp. 1–6 (2008)
Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for ip traceback. In: Proceedings of IEEE INFOCOM, pp. 878–886 (2001)
Wang, Q., Vu, L., Nahrstedt, K., Khurana, H.: Mis: malicious nodes identification scheme in network-coding-based peer-to-peer streaming. In: Proceedings of IEEE INFOCOM, pp. 1–5 (2010)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Zhang, P., Lin, C. (2016). Concluding Remarks and Future Directions. In: Security in Network Coding. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-31083-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-31083-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31082-4
Online ISBN: 978-3-319-31083-1
eBook Packages: Computer ScienceComputer Science (R0)