Work place: School of Computer Science and Technology, Wuhan University of Technology Wuhan, China
E-mail: yhheghy@163.com
Website:
Research Interests: Network Architecture, Network Security
Biography
Hong Yang, borned in Yingcheng City of Hubei Province on May 8th, 1987 and received his B.S.degree in Computer Science and Technology from Wuhan University of Technology in 2008. He is now working toward his M.S.degree in school of Computer Science and Technology at Wuhan University of Technology,China.His research interest is network security.
DOI: https://doi.org/10.5815/ijwmt.2012.01.07, Pub. Date: 15 Feb. 2012
In network system, network coding allows intermediate nodes to encode the received messages before forwarding them, thus network coding is vulnerable to pollution attacks. Besides, the attacks are amplified by the network coding process with the result that the whole network maybe pollutes. In this paper, we proposed a novel unconditionally secure authentication code for multi-source network coding, which is robust against pollution attacks. For the authentication scheme based on theoretic strength, it is robust against those attackers that have unlimited computational resources, and the intermediate nodes therein can verify the integrity and origin of the encoded messages received without having to decode them, and the receiver nodes can check them out and discard the messages that fail the verification. By this way, the pollution is canceled out before reaching the destinations.
[...] Read more.DOI: https://doi.org/10.5815/ijcnis.2011.02.08, Pub. Date: 8 Mar. 2011
In a network system, network coding allows intermediate nodes to encode the received messages before forwarding them, thus network coding is vulnerable to pollution attacks. Besides, the attacks are amplified by the network coding process with the result that the whole network maybe polluted. In this paper, we proposed a novel unconditionally secure authentication code for multi-source network coding, which is robust against pollution attacks. For the authentication scheme based on theoretic strength, it is robust against those attackers that have unlimited computational resources, and the intermediate nodes therein can verify the integrity and origin of the encoded messages received without having to decode them, and the receiver nodes can check them out and discard the messages that fail the verification. By this way, the pollution is canceled out before reaching the destinations.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals