{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T11:14:12Z","timestamp":1694690052872},"reference-count":13,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2011,3,30]],"date-time":"2011-03-30T00:00:00Z","timestamp":1301443200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2012,1]]},"abstract":"ABSTRACT<\/jats:title>Network coding offers an excellent solution for maximizing throughput in various networks. Because of its simplicity and high efficiency, the idea of network coding can also be used for designing lightweight key distribution schemes for wireless ad hoc network. This paper presents a key distribution scheme that exploits the inherent security properties of network coding. The new scheme relies on simple XOR network coding operations to provide data confidentiality and uses message authentication codes to guarantee the integrity of the distributed keys. We also show that our scheme can resist a series of attacks in wireless ad hoc network and has better performance compared with previous schemes proposed in the literature. Copyright \u00a9 2011 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.317","type":"journal-article","created":{"date-parts":[[2011,3,30]],"date-time":"2011-03-30T09:10:35Z","timestamp":1301476235000},"page":"59-67","source":"Crossref","is-referenced-by-count":4,"title":["A key distribution scheme using network coding for mobile ad hoc network"],"prefix":"10.1002","volume":"5","author":[{"given":"Jianwei","family":"Liu","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering Beihang University Beijing China"}]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[{"name":"School of Computer Science Wuhan University Wuhan China"}]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science Wuhan University Wuhan China"}]},{"given":"Kun","family":"He","sequence":"additional","affiliation":[{"name":"School of Computer Science Wuhan University Wuhan China"}]}],"member":"311","published-online":{"date-parts":[[2011,3,30]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"e_1_2_8_3_1","article-title":"Network coding security: attacks and countermeasures","author":"Lima L","year":"2008","journal-title":"Cryptography and Security"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2008.4664878"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76843-2_42"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498511"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.336"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061945"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.78"},{"key":"e_1_2_8_11_1","first-page":"103","volume-title":"Wireless\/Mobile Network Security","author":"Wu B","year":"2006"},{"key":"e_1_2_8_12_1","first-page":"1","volume-title":"Proceedings of the International Conference on Security and Cryptography","author":"Oliveira PF","year":"2007"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778432"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.317","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T07:45:23Z","timestamp":1694591123000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,30]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1002\/sec.317"],"URL":"https:\/\/doi.org\/10.1002\/sec.317","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3,30]]}}}