×
We consider a communication network with random network coding which can be attacked by adversaries of two types. One of them can wiretap original packets.
We consider a communication network with random network coding which can be attacked by adversaries of two types. One of them can wiretap original packets ...
In this paper, to provide secure transmission in random network coding, we focus on using the Gabidulin–Paramonov–Tretjakov (GPT) public key cryptosystem [7–11] ...
The main result is that the proposed scheme is secure against wiretapping and insertion attacks under some conditions which depend on rank code parameters.
Oct 22, 2024 · We consider a communication network with random network coding which can be attacked by adversaries of two types.
We distinguish the following forms of network security: security against an eavesdropper that attempts to recover part of the data, security against a malicious ...
Nov 6, 2024 · Based on random linear network coding technology, in this paper, a transmission strategy to prevent eavesdropping attacks is proposed for single-source ...
People also ask
Apr 1, 2020 · The authors investigate physical layer security design, which employs a random linear network coding with opportunistic relaying and jamming ...
Then a secure random network coding model is proposed for resisting the Byzantine attacks where the CBC (Cipher Block Chaining) technology is combined with ...
We propose a low-complexity cryptographic scheme that exploits the inherent security provided by random linear network coding and offers the advantage of ...