{"id":"https://openalex.org/W1994281270","doi":"https://doi.org/10.1109/trustcom.2014.35","title":"A Survey of Security Network Coding toward Various Attacks","display_name":"A Survey of Security Network Coding toward Various Attacks","publication_year":2014,"publication_date":"2014-09-01","ids":{"openalex":"https://openalex.org/W1994281270","doi":"https://doi.org/10.1109/trustcom.2014.35","mag":"1994281270"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2014.35","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013889905","display_name":"Shixiong Yao","orcid":"https://orcid.org/0000-0001-5013-2077"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shixiong Yao","raw_affiliation_strings":["Department of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Department of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Department of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029762126","display_name":"Lan Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lan Deng","raw_affiliation_strings":["Department of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085631526","display_name":"Chiheng Wang","orcid":"https://orcid.org/0000-0002-8153-5909"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chiheng Wang","raw_affiliation_strings":["Department of Computer Science, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.927,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":11,"citation_normalized_percentile":{"value":0.765939,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":86,"max":87},"biblio":{"volume":null,"issue":null,"first_page":"252","last_page":"259"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9867,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.84780526},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.6983837},{"id":"https://openalex.org/keywords/encode","display_name":"ENCODE","score":0.5198641},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.50809836},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.43304935},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.41606012}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.84780526},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7402558},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.6983837},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.67278135},{"id":"https://openalex.org/C66746571","wikidata":"https://www.wikidata.org/wiki/Q1134833","display_name":"ENCODE","level":3,"score":0.5198641},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.50809836},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47269157},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.43304935},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42720348},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.41606012},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.41002178},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.21172959},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.14813817},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.079203695},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.07717997},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.07097906},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom.2014.35","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":54,"referenced_works":["https://openalex.org/W1521680667","https://openalex.org/W1538771458","https://openalex.org/W1656678770","https://openalex.org/W1666539389","https://openalex.org/W1978523357","https://openalex.org/W1979862252","https://openalex.org/W1980297179","https://openalex.org/W1994018701","https://openalex.org/W1998100733","https://openalex.org/W1998247350","https://openalex.org/W2001385812","https://openalex.org/W2006601662","https://openalex.org/W2006947308","https://openalex.org/W2032976609","https://openalex.org/W2053616686","https://openalex.org/W2055051143","https://openalex.org/W2058740649","https://openalex.org/W2059186619","https://openalex.org/W2059827048","https://openalex.org/W2070555245","https://openalex.org/W2073013516","https://openalex.org/W2094102717","https://openalex.org/W2096444692","https://openalex.org/W2098317210","https://openalex.org/W2105831729","https://openalex.org/W2107165730","https://openalex.org/W2112966684","https://openalex.org/W2117955912","https://openalex.org/W2127350146","https://openalex.org/W2128881496","https://openalex.org/W2136237463","https://openalex.org/W2136395129","https://openalex.org/W2137771025","https://openalex.org/W2138928022","https://openalex.org/W2139944992","https://openalex.org/W2140269527","https://openalex.org/W2142950407","https://openalex.org/W2145989669","https://openalex.org/W2146009225","https://openalex.org/W2146547664","https://openalex.org/W2146985636","https://openalex.org/W2147395772","https://openalex.org/W2149863032","https://openalex.org/W2153646424","https://openalex.org/W2153655209","https://openalex.org/W2156927364","https://openalex.org/W2162219773","https://openalex.org/W2962875006","https://openalex.org/W3105544438","https://openalex.org/W3163366489","https://openalex.org/W4232801089","https://openalex.org/W4253824409","https://openalex.org/W67291757","https://openalex.org/W68293075"],"related_works":["https://openalex.org/W4387918499","https://openalex.org/W4386360526","https://openalex.org/W2772112465","https://openalex.org/W2766105476","https://openalex.org/W2368710903","https://openalex.org/W2171073911","https://openalex.org/W2167638421","https://openalex.org/W2158905603","https://openalex.org/W2082942584","https://openalex.org/W2037009907"],"abstract_inverted_index":{"As":[0],"one":[1],"of":[2,57,69,77,83,103,121,135],"the":[3,50,55,101],"emerging":[4],"technologies":[5],"with":[6],"most":[7],"potential":[8],"for":[9,132],"developing,":[10],"Network":[11],"Coding":[12],"(NC)":[13],"has":[14,23],"gained":[15],"significant":[16],"momentum.":[17],"Due":[18],"to":[19],"encode-and-forward":[20],"model,":[21],"NC":[22,40,87],"natural":[24],"privacy":[25],"in":[26,60,86,107],"communication,":[27],"but":[28],"it":[29],"also":[30],"induces":[31],"that":[32,49],"attackers":[33],"become":[34],"more":[35,45],"imperceptible":[36],"and":[37,96,99,111,125,147],"impact":[38],"on":[39],"caused":[41],"by":[42,128],"them":[43],"becomes":[44],"far-reaching.":[46],"This":[47],"requires":[48],"security":[51],"schemes":[52],"should":[53],"consider":[54],"characteristics":[56],"different":[58],"attacks":[59,85,105],"NC.":[61],"In":[62],"this":[63],"paper,":[64],"we":[65,79,116],"provide":[66],"a":[67,118],"survey":[68],"secure":[70,138],"network":[71,112,139],"coding":[72,113,140],"toward":[73],"various":[74],"attacks.":[75,130],"First":[76],"all,":[78],"summarize":[80],"four":[81],"types":[82],"representative":[84],"system":[88],"including":[89],"entropy":[90],"attack,":[91,93,98],"Byzantine":[92],"pollution":[94],"attack":[95],"eavesdropping":[97],"compare":[100],"differences":[102],"these":[104,129],"between":[106],"traditional":[108],"store-and-forward":[109],"mode":[110],"mode.":[114],"Secondly,":[115],"give":[117],"comprehensive":[119],"investigation":[120],"numerous":[122],"defense":[123],"approaches":[124],"mechanisms":[126],"classified":[127],"Finally,":[131],"stimulating":[133],"stream":[134],"thoughts":[136],"about":[137],"schemes,":[141],"several":[142],"open":[143],"issues":[144],"are":[145],"proposed":[146],"discussed.":[148]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1994281270","counts_by_year":[{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2}],"updated_date":"2025-01-16T22:13:10.676146","created_date":"2016-06-24"}