Hong Yang

Work place: School of Computer Science and Technology, Wuhan University of Technology Wuhan, China

E-mail: yhheghy@163.com

Website:

Research Interests: Network Architecture, Network Security

Biography

Hong Yang, borned in Yingcheng City of Hubei Province on May 8th, 1987 and received his B.S.degree in Computer Science and Technology from Wuhan University of Technology in 2008. He is now working toward his M.S.degree in school of Computer Science and Technology at Wuhan University of Technology,China.His research interest is network security.

Author Articles
An Unconditionally Secure Authentication Code For Multi-Source Network Coding

By Hong Yang Mingxi Yang

DOI: https://doi.org/10.5815/ijwmt.2012.01.07, Pub. Date: 15 Feb. 2012

In network system, network coding allows intermediate nodes to encode the received messages before forwarding them, thus network coding is vulnerable to pollution attacks. Besides, the attacks are amplified by the network coding process with the result that the whole network maybe pollutes. In this paper, we proposed a novel unconditionally secure authentication code for multi-source network coding, which is robust against pollution attacks. For the authentication scheme based on theoretic strength, it is robust against those attackers that have unlimited computational resources, and the intermediate nodes therein can verify the integrity and origin of the encoded messages received without having to decode them, and the receiver nodes can check them out and discard the messages that fail the verification. By this way, the pollution is canceled out before reaching the destinations.

[...] Read more.
The Research of Unconditionally Secure Authentication Code For Multi-Source Network Coding

By Hong Yang Mingxi Yang

DOI: https://doi.org/10.5815/ijcnis.2011.02.08, Pub. Date: 8 Mar. 2011

In a network system, network coding allows intermediate nodes to encode the received messages before forwarding them, thus network coding is vulnerable to pollution attacks. Besides, the attacks are amplified by the network coding process with the result that the whole network maybe polluted. In this paper, we proposed a novel unconditionally secure authentication code for multi-source network coding, which is robust against pollution attacks. For the authentication scheme based on theoretic strength, it is robust against those attackers that have unlimited computational resources, and the intermediate nodes therein can verify the integrity and origin of the encoded messages received without having to decode them, and the receiver nodes can check them out and discard the messages that fail the verification. By this way, the pollution is canceled out before reaching the destinations.

[...] Read more.
Other Articles