Entry Dong:2011:PDA from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Dong:2011:PDA,
author = "Jing Dong and Reza Curtmola and Cristina
Nita-Rotaru",
title = "Practical defenses against pollution attacks in
wireless network coding",
journal = j-TISSEC,
volume = "14",
number = "1",
pages = "7:1--7:??",
month = may,
year = "2011",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1952982.1952989",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Jun 2 07:27:23 MDT 2011",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Recent studies have shown that network coding can
provide significant benefits to network protocols, such
as increased throughput, reduced network congestion,
higher reliability, and lower power consumption. The
core principle of network coding is that intermediate
nodes actively mix input packets to produce output
packets. This mixing subjects network coding systems to
a severe security threat, known as a pollution attack,
where attacker nodes inject corrupted packets into the
network. Corrupted packets propagate in an epidemic
manner, depleting network resources and significantly
decreasing throughput. Pollution attacks are
particularly dangerous in wireless networks, where
attackers can easily inject packets or compromise
devices due to the increased network vulnerability.",
acknowledgement = ack-nhfb,
articleno = "7",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- actively,
13(4)38
- against,
2(3)230,
2(4)354,
2(4)416,
9(4)461,
10(3)11,
11(2)3,
11(3)13,
11(4)22,
12(3)18,
13(3)22,
13(3)28,
14(1)13,
14(3)24,
15(1)3,
15(2)6,
15(2)8,
15(3)14,
16(1)1,
16(1)2,
16(2)8,
16(4)13,
17(1)4,
17(2)7,
17(2)8,
18(1)2,
18(2)7
- attacker,
2(2)159,
8(1)78,
10(1)4,
10(4)3,
10(4)6,
11(3)12,
11(3)15,
12(1)4,
12(2)12,
12(3)17,
12(4)22,
13(4)37,
14(1)13,
14(4)31,
15(1)2,
15(4)16,
17(2)8,
17(3)11,
17(4)13,
17(4)16,
18(1)1,
18(2)7,
18(4)13
- benefit,
9(2)181,
9(4)461,
10(1)3,
10(3)11,
10(4)4,
11(4)20,
11(4)23,
12(2)13,
13(4)31,
14(1)9,
16(1)1,
16(3)11
- coding,
18(1)4
- compromise,
2(2)159,
2(3)230,
11(4)22,
14(4)28,
14(4)32,
15(1)5,
15(2)9,
17(2)7,
17(3)11,
18(2)5
- congestion,
15(2)6
- consumption,
9(2)162,
11(3)14
- core,
10(3)9,
10(4)3,
12(2)8,
15(1)4,
15(2)6,
16(4)17,
18(4)12
- Curtmola, Reza,
10(4)6,
14(1)12
- dangerous,
12(2)10,
12(3)19,
17(3)11
- defense,
2(3)230,
11(2)3,
12(2)11,
14(3)24,
14(3)27,
14(4)31,
15(2)6,
15(4)16,
16(4)13,
17(2)8,
17(3)11
- device,
2(3)230,
10(4)3,
10(4)4,
11(2)2,
11(3)14,
12(3)15,
13(4)30,
15(1)4,
15(2)7,
16(2)6,
16(3)10,
17(3)10,
17(4)14,
17(4)16,
18(2)7
- due,
2(4)354,
11(4)19,
13(3)25,
14(4)31,
15(2)9,
18(1)1
- easily,
12(1)6,
14(1)11,
16(4)17,
17(2)6,
17(3)11,
17(3)12,
18(4)13
- epidemic,
10(4)1
- have,
1(1)66,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)269,
10(1)2,
10(1)4,
10(2)5,
10(3)10,
10(3)12,
10(4)4,
10(4)5,
10(4)6,
11(1)2,
11(2)1,
11(2)5,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
11(4)21,
12(1)1,
12(1)2,
12(2)10,
12(2)13,
12(3)15,
12(3)16,
12(3)17,
12(4)20,
13(3)20,
13(3)26,
13(3)27,
13(3)28,
13(4)32,
13(4)36,
13(4)39,
13(4)40,
14(1)6,
14(1)10,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
14(4)29,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
16(4)15,
16(4)16,
17(1)3,
17(3)11,
17(3)12,
17(4)13,
17(4)15,
18(1)1,
18(1)3,
18(2)5,
18(2)7,
18(4)13
- higher,
12(4)22,
17(3)12
- increased,
10(4)6,
17(4)15,
18(2)5
- input,
10(4)3,
10(4)4,
12(2)10,
14(3)27,
14(4)32,
15(4)15,
15(4)17,
16(1)4,
16(2)6,
18(1)4
- known,
10(3)11,
10(4)1,
10(4)3,
11(2)1,
11(2)3,
11(2)4,
11(4)20,
13(1)10,
13(3)27,
13(4)33,
14(3)27,
17(1)2,
17(2)7,
18(1)1
- lower,
11(2)3,
12(3)18,
15(4)18
- manner,
2(1)34,
12(2)13,
12(3)14,
14(3)25,
15(2)10,
18(3)11
- mix,
10(2)6,
17(1)4
- Nita-Rotaru, Cristina,
7(3)457,
10(4)6,
13(4)38,
17(4)13
- node,
10(1)3,
10(4)1,
10(4)6,
11(2)3,
11(3)12,
11(3)13,
11(3)14,
11(3)15,
11(4)18,
11(4)22,
11(4)23,
12(1)2,
12(3)18,
13(3)25,
13(4)29,
13(4)34,
13(4)38,
14(3)27,
17(4)13
- output,
10(4)3,
13(1)10,
14(3)26,
14(4)30,
16(2)6,
17(3)12
- packet,
2(3)269,
7(2)319,
11(2)2,
11(3)15,
12(2)10,
12(2)11,
12(2)13,
12(4)22,
13(4)35,
14(1)5,
15(2)6,
15(4)16
- particularly,
11(3)16,
14(4)28,
16(2)7,
18(3)10
- power,
1(1)93,
9(2)162,
10(4)1,
12(2)10,
14(1)8,
14(1)13,
15(1)2,
18(2)5,
18(2)7
- practical,
2(4)390,
4(2)158,
7(2)319,
9(3)325,
10(2)6,
10(4)1,
11(2)1,
11(2)5,
11(4)18,
12(3)19,
14(1)14,
14(2)20,
14(4)29,
15(1)4,
15(2)6,
15(2)7,
15(4)16,
16(3)10,
16(3)12,
16(4)13,
17(4)16,
18(1)3,
18(4)13
- principle,
2(2)138,
10(2)5,
10(4)1,
11(4)18,
13(1)4
- produce,
12(1)3,
15(2)9
- propagate,
10(4)1,
13(3)21,
16(2)5
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(3)230,
2(4)390,
7(2)319,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
10(4)6,
11(1)3,
11(1)4,
11(2)2,
11(3)12,
11(3)13,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)17,
15(4)18,
16(1)3,
16(2)5,
16(3)9,
16(3)11,
16(4)17,
17(2)5,
17(3)11,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)5,
18(2)7,
18(4)13,
18(4)14
- recent,
2(1)65,
2(2)138,
10(2)8,
10(3)9,
11(1)2,
11(4)22,
12(1)2,
12(2)12,
14(1)14,
14(4)29,
15(1)3,
16(2)7,
16(3)10,
18(1)1,
18(2)5,
18(2)7,
18(4)13
- reduced,
9(4)391
- resource,
2(3)332,
9(4)391,
10(4)4,
11(1)2,
11(1)3,
11(1)4,
11(2)2,
11(3)14,
11(4)19,
11(4)20,
12(1)1,
12(1)6,
12(4)22,
13(3)20,
14(1)10,
15(4)18,
17(1)2,
17(3)9,
18(2)6
- Rotaru, Cristina, Nita-,
7(3)457,
10(4)6,
13(4)38,
17(4)13
- severe,
11(3)14,
13(1)10,
14(1)2
- shown,
2(1)3,
11(1)2,
11(2)3,
12(3)16,
13(3)25,
13(4)33,
15(2)7,
15(2)10,
15(3)14,
18(2)5,
18(2)6
- significant,
10(3)11,
11(2)1,
12(2)12,
13(4)36,
15(1)4,
15(3)12,
17(4)16
- significantly,
1(1)93,
9(2)181,
9(4)461,
11(2)3,
12(3)17,
13(4)29,
15(1)4,
15(2)9,
15(2)10,
15(3)11,
16(3)9,
17(1)1,
18(1)1
- study,
2(3)230,
2(4)416,
7(2)206,
10(2)5,
10(4)5,
11(1)3,
11(2)3,
11(4)23,
12(1)6,
12(3)14,
12(4)20,
13(4)40,
14(2)18,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(2)10,
15(3)13,
17(1)1,
17(2)7,
17(3)12,
17(4)14,
18(1)1,
18(1)2,
18(1)4,
18(2)5,
18(2)7,
18(3)9,
18(4)13
- subject,
1(1)26,
9(2)162,
9(4)421,
11(1)3,
11(1)4,
11(3)12,
13(3)26,
15(3)12,
17(1)2,
17(4)14,
18(2)5
- threat,
7(4)489,
10(3)11,
11(2)2,
11(2)3,
12(2)12,
14(3)24,
15(1)2,
15(2)7,
16(2)6,
16(2)8,
16(3)9,
17(4)16,
18(2)5,
18(2)7,
18(4)12,
18(4)14
- vulnerability,
2(4)416,
7(2)319,
12(2)11,
13(4)38,
14(1)13,
17(1)1,
17(3)11
- where,
2(3)230,
9(4)461,
10(4)4,
10(4)5,
10(4)6,
11(3)12,
11(3)13,
11(4)19,
12(1)3,
12(3)15,
12(3)16,
12(4)20,
13(3)20,
13(3)22,
13(4)33,
13(4)37,
15(2)6,
15(3)12,
15(3)13,
16(1)4,
16(2)5,
17(3)10,
17(4)16,
18(1)2,
18(2)8
- wireless,
7(2)319,
8(2)228,
9(2)162,
10(4)6,
11(2)1,
11(2)2,
11(3)12,
11(3)13,
11(3)14,
11(4)19,
11(4)22,
11(4)23,
14(1)5,
17(2)5