Design and realization of efficient & secure multi-homed systems based on random linear network coding
Multi-homing is a new mechanism that enables hosts with multiple network interfaces (IP addresses), to connect to more than one data link. This technology enhances Internet connectivity and reliability without compromising efficient performance. Like any communication system, the security of multi-h...
Uloženo v:
| Vydáno v: | Computer networks (Amsterdam, Netherlands : 1999) Ročník 163; s. 106886 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Amsterdam
Elsevier B.V
09.11.2019
Elsevier Sequoia S.A |
| Témata: | |
| ISSN: | 1389-1286, 1872-7069 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Multi-homing is a new mechanism that enables hosts with multiple network interfaces (IP addresses), to connect to more than one data link. This technology enhances Internet connectivity and reliability without compromising efficient performance. Like any communication system, the security of multi-homed systems is of great importance. However, this issue remains largely un-attempted, where only few papers in the literature discuss, address and present security solutions for multi-homed systems. On the other hand, Random Linear Network Coding (RLNC) has recently emerged as a new coding technique that aims at improving system performance by efficiently transmitting and compressing data in general multi-source multicast networks. In this paper, a data confidentiality and availability scheme based on RNLC, is proposed for multi-homed systems. The proposed solution exploits the random physical characteristics of wireless channels, along with a pre-shared secret key, to derive dynamic keys which are used to generate random and dynamic cryptographic primitives. These primitives mainly include two permutation tables and a set of secret invertible RLNC matrices, all of which change for every input message. It has been shown that by securing the cryptographic primitives needed in the ciphering/deciphering process, one can jointly enhance the security and performance of transmitted data in multi-homed systems. Finally, security and performance analysis are presented to validate the efficiency and security of the proposed encryption/encoding scheme. |
|---|---|
| AbstractList | Multi-homing is a new mechanism that enables hosts with multiple network interfaces (IP addresses), to connect to more than one data link. This technology enhances Internet connectivity and reliability without compromising efficient performance. Like any communication system, the security of multi-homed systems is of great importance. However, this issue remains largely un-attempted, where only few papers in the literature discuss, address and present security solutions for multi-homed systems. On the other hand, Random Linear Network Coding (RLNC) has recently emerged as a new coding technique that aims at improving system performance by efficiently transmitting and compressing data in general multi-source multicast networks. In this paper, a data confidentiality and availability scheme based on RNLC, is proposed for multi-homed systems. The proposed solution exploits the random physical characteristics of wireless channels, along with a pre-shared secret key, to derive dynamic keys which are used to generate random and dynamic cryptographic primitives. These primitives mainly include two permutation tables and a set of secret invertible RLNC matrices, all of which change for every input message. It has been shown that by securing the cryptographic primitives needed in the ciphering/deciphering process, one can jointly enhance the security and performance of transmitted data in multi-homed systems. Finally, security and performance analysis are presented to validate the efficiency and security of the proposed encryption/encoding scheme. |
| ArticleNumber | 106886 |
| Author | Noura, Hassan N. Melki, Reem Malli, Mohammad Chehab, Ali |
| Author_xml | – sequence: 1 givenname: Hassan N. surname: Noura fullname: Noura, Hassan N. email: hn49@aub.edu.lb organization: American University of Beirut Department of Electrical and Computer Engineering, Lebanon – sequence: 2 givenname: Reem surname: Melki fullname: Melki, Reem email: rmm71@aub.edu.lb organization: American University of Beirut Department of Electrical and Computer Engineering, Lebanon – sequence: 3 givenname: Mohammad surname: Malli fullname: Malli, Mohammad email: mmalli@aou.edu.lb organization: Arab Open University, Department of Computer Sciences, Lebanon – sequence: 4 givenname: Ali surname: Chehab fullname: Chehab, Ali email: chehab@aub.edu.lb organization: American University of Beirut Department of Electrical and Computer Engineering, Lebanon |
| BookMark | eNqFkE1PGzEQhi0EEhD4BxwsIXHb1B-bXbuHSghKQYrEBc6WY4-p0107tR2q9NfjsJx6KCd_aJ53Zp5TdBhiAIQuKJlTQrsv67mJY4AyZ4TK-tUJ0R2gEyp61vSkk4f1zoVsKBPdMTrNeU0IaVsmTpC7hexfAtbB4gR68H918THg6DA4542HUPAVzmC2CfC4HYpvfsYRLM67XGDMeKVzfVUk1Yw44sEH0AnXcf7E9AubaH14OUNHTg8Zzj_OGXq--_50c98sH3883FwvG8N5W5pFT-WCg1itFr1umaFM9-Asa4Xl3DlhXW85kUyD5JI5abnlK2cJc31LoFvwGbqccjcp_t5CLmodtynUlopxxrpWEt7Xqq9TlUkx5wROGV_e9y5J-0FRovZe1VpNXtXeq5q8Vrj9B94kP-q0-wz7NmFQ13_1kFTeyzVgfQJTlI3-_wFvsBmXWQ |
| CitedBy_id | crossref_primary_10_1016_j_micpro_2020_103201 crossref_primary_10_1016_j_jisa_2022_103165 crossref_primary_10_1007_s13198_021_01402_6 crossref_primary_10_1016_j_adhoc_2022_102928 |
| Cites_doi | 10.1016/j.phycom.2018.10.008 10.1016/j.phpro.2012.02.286 10.1007/s11042-018-5660-y 10.1007/s11042-018-7000-7 10.1109/TPDS.2013.161 10.1080/00031305.1988.10475524 10.1109/TSP.2018.2869122 10.1109/TMC.2015.2426710 10.1016/j.comnet.2014.09.013 10.1504/IJSN.2011.043669 10.1016/j.ipl.2018.03.010 10.1109/ACCESS.2018.2832854 10.1109/TIT.2006.881746 |
| ContentType | Journal Article |
| Copyright | 2019 Copyright Elsevier Sequoia S.A. Nov 9, 2019 |
| Copyright_xml | – notice: 2019 – notice: Copyright Elsevier Sequoia S.A. Nov 9, 2019 |
| DBID | AAYXX CITATION 7SC 8FD E3H F2A JQ2 L7M L~C L~D |
| DOI | 10.1016/j.comnet.2019.106886 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Library and Information Science Abstracts (LISA) ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1872-7069 |
| ExternalDocumentID | 10_1016_j_comnet_2019_106886 S1389128619301501 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5GY 5VS 6OB 7-5 71M 77K 8P~ AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABMAC ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF IHE J1W JJJVA KOM M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. PQQKQ Q38 RIG ROL RPZ RXW SDF SDG SDP SES SPC SPCBC SST SSV SSZ T5K TAE TN5 ZMT ~G- 29F 77I 9DU AATTM AAXKI AAYWO AAYXX ABFNM ABJNI ABXDB ACLOT ACNNM ACVFH ADCNI ADJOM AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS F0J FGOYB HZ~ R2- SEW ZY4 ~HD 7SC 8FD E3H F2A JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c334t-571953e8bb57a42c12a7efd248d33ff8df7d3092ae9392f9d3d3bfd02f740e653 |
| ISICitedReferencesCount | 6 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000492797800011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1389-1286 |
| IngestDate | Fri Nov 14 19:19:05 EST 2025 Sat Nov 29 07:03:55 EST 2025 Tue Nov 18 21:18:57 EST 2025 Fri Feb 23 02:26:21 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Random linear network coding Lightweight encryption-authentication scheme Secure multi-homed networks |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c334t-571953e8bb57a42c12a7efd248d33ff8df7d3092ae9392f9d3d3bfd02f740e653 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2322649037 |
| PQPubID | 47119 |
| ParticipantIDs | proquest_journals_2322649037 crossref_citationtrail_10_1016_j_comnet_2019_106886 crossref_primary_10_1016_j_comnet_2019_106886 elsevier_sciencedirect_doi_10_1016_j_comnet_2019_106886 |
| PublicationCentury | 2000 |
| PublicationDate | 2019-11-09 |
| PublicationDateYYYYMMDD | 2019-11-09 |
| PublicationDate_xml | – month: 11 year: 2019 text: 2019-11-09 day: 09 |
| PublicationDecade | 2010 |
| PublicationPlace | Amsterdam |
| PublicationPlace_xml | – name: Amsterdam |
| PublicationTitle | Computer networks (Amsterdam, Netherlands : 1999) |
| PublicationYear | 2019 |
| Publisher | Elsevier B.V Elsevier Sequoia S.A |
| Publisher_xml | – name: Elsevier B.V – name: Elsevier Sequoia S.A |
| References | Nasiraee, Mohasefi (bib0024) 2012 Noura, Melki, Chehab, Mansour, Martin (bib0027) 2018 Chen, Wu, Dai, Huang (bib0002) 2018 Noura, Hussein, Martin, Boukhatem, Al Agha (bib0014) 2015 Chhabra, Lata (bib0034) 2018 Massoudi, Lefebvre, De Vleeschouwer, Macq, Quisquater (bib0035) 2008; 2008 Noura, Chehab, Noura, Couturier, Mansour (bib0028) 2019; 78 Noura, Chehab, Sleem, Noura, Couturier, Mansour (bib0029) 2018 Xu, Xing, Nallanathan, Yang, Chai (bib0004) 2018 Lee Rodgers, Nicewander (bib0032) 1988; 42 de Alwis, Arachchi, Fernando, Kondoz (bib0017) 2013 Naves (bib0009) 2018 Chou, Wu, Jain (bib0011) 2003; 41 Ying, Cai, Guo, Tang, Chen, Qu (bib0030) 2018; 66 Melki, Mansour, Chehab (bib0015) 2018 Najeem, Murthy (bib0021) 2011 Melki, Noura, Mansour, Chehab (bib0031) 2019; 32 Wu, Yuen, Cheung, Chen (bib0001) 2016; 15 Namal, Gurtov, Bennis (bib0007) 2011 Atkinson, Bhatti, Hailes (bib0006) 2009; 28 Venkadesh, Dhas, Divya (bib0008) 2015 Xu, Su, Zheng, Luo, Dong, Zhang (bib0005) 2018 Dwivedi, Morawiecki, Singh, Dhar (bib0033) 2018; 136 Lima, Médard, Barros (bib0022) 2007 Zhang, Lin, Jiang, Fan, Shen (bib0012) 2013; 25 Melki, Noura, Mansour, Chehab (bib0026) 2018 Gómez, Garrido, Rodríguez, Agüero, Muñoz (bib0016) 2014 Noura, Melki, Chehab, Mansour (bib0025) 2018 Wang, Chen, Yu (bib0003) 2018 Noura, Martin, Agha, Chahine (bib0013) 2014; 75 Tang, Sun, Yang, Long (bib0023) 2018; 6 Fathy, ElBatt, Youssef (bib0020) 2011; 6 K. Fouli, V.W.C. Chook, J. Heide, M. Médard, S.J. Shi, Random linear network coding (RLNC)-based symbol representation, in: draft-heide-nwcrg-rlnc-00, 2019. Ho, Médard, Koetter, Karger, Effros, Shi, Leong (bib0018) 2006; 52 Cao, Tang, Luo (bib0019) 2012; 24 Zhang (10.1016/j.comnet.2019.106886_bib0012) 2013; 25 Xu (10.1016/j.comnet.2019.106886_bib0004) 2018 Naves (10.1016/j.comnet.2019.106886_bib0009) 2018 Chou (10.1016/j.comnet.2019.106886_bib0011) 2003; 41 Lima (10.1016/j.comnet.2019.106886_bib0022) 2007 Wang (10.1016/j.comnet.2019.106886_bib0003) 2018 Ying (10.1016/j.comnet.2019.106886_bib0030) 2018; 66 Melki (10.1016/j.comnet.2019.106886_bib0031) 2019; 32 Melki (10.1016/j.comnet.2019.106886_bib0026) 2018 Noura (10.1016/j.comnet.2019.106886_bib0014) 2015 Gómez (10.1016/j.comnet.2019.106886_bib0016) 2014 Noura (10.1016/j.comnet.2019.106886_bib0029) 2018 Noura (10.1016/j.comnet.2019.106886_bib0013) 2014; 75 Cao (10.1016/j.comnet.2019.106886_bib0019) 2012; 24 Nasiraee (10.1016/j.comnet.2019.106886_bib0024) 2012 Namal (10.1016/j.comnet.2019.106886_bib0007) 2011 Venkadesh (10.1016/j.comnet.2019.106886_bib0008) 2015 Atkinson (10.1016/j.comnet.2019.106886_bib0006) 2009; 28 Noura (10.1016/j.comnet.2019.106886_bib0027) 2018 10.1016/j.comnet.2019.106886_bib0010 Massoudi (10.1016/j.comnet.2019.106886_bib0035) 2008; 2008 Xu (10.1016/j.comnet.2019.106886_bib0005) 2018 Noura (10.1016/j.comnet.2019.106886_bib0025) 2018 de Alwis (10.1016/j.comnet.2019.106886_bib0017) 2013 Wu (10.1016/j.comnet.2019.106886_bib0001) 2016; 15 Tang (10.1016/j.comnet.2019.106886_bib0023) 2018; 6 Fathy (10.1016/j.comnet.2019.106886_bib0020) 2011; 6 Lee Rodgers (10.1016/j.comnet.2019.106886_bib0032) 1988; 42 Dwivedi (10.1016/j.comnet.2019.106886_bib0033) 2018; 136 Melki (10.1016/j.comnet.2019.106886_bib0015) 2018 Chen (10.1016/j.comnet.2019.106886_bib0002) 2018 Ho (10.1016/j.comnet.2019.106886_bib0018) 2006; 52 Noura (10.1016/j.comnet.2019.106886_bib0028) 2019; 78 Najeem (10.1016/j.comnet.2019.106886_bib0021) 2011 Chhabra (10.1016/j.comnet.2019.106886_bib0034) 2018 |
| References_xml | – volume: 78 start-page: 16527 year: 2019 end-page: 16561 ident: bib0028 article-title: Lightweight, dynamic and efficient image encryption scheme publication-title: Multimed. Tools Appl. – start-page: 1267 year: 2018 end-page: 1272 ident: bib0027 article-title: Efficient and secure physical encryption scheme for low-power wireless M2M devices publication-title: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) – volume: 28 start-page: 1 year: 2009 end-page: 10 ident: bib0006 article-title: Site-controlled secure multi-homing and traffic engineering for IP publication-title: MILCOM 2009-2009 IEEE Military Communications Conference – start-page: 1 year: 2011 end-page: 15 ident: bib0007 article-title: Securing the backhaul for mobile and multi-homed femtocells publication-title: IEEE Proc. Future Network & Mobile Summit (FutureNetw) – start-page: 246 year: 2011 end-page: 251 ident: bib0021 article-title: On enhancing the random linear network coding publication-title: Networks (ICON), 2011 17th IEEE International Conference on – start-page: 401 year: 2018 end-page: 406 ident: bib0034 article-title: Enhancing data security using obfuscated 128-bit AES algorithm-an active hardware obfuscation approach at RTL level publication-title: IEEE proc. International Conference on Advances in Computing, Communications and Informatics (ICACCI) – year: 2018 ident: bib0009 article-title: A framework for evaluating physical-layer network coding gains in multi-hop wireless networks publication-title: IEEE Trans. Mob. Comput. – volume: 42 start-page: 59 year: 1988 end-page: 66 ident: bib0032 article-title: Thirteen ways to look at the correlation coefficient publication-title: Am. Stat. – volume: 6 start-page: 26059 year: 2018 end-page: 26068 ident: bib0023 article-title: A network coding and DES based dynamic encryption scheme for moving target defense publication-title: IEEE Access – volume: 75 start-page: 99 year: 2014 end-page: 112 ident: bib0013 article-title: ERSS-RLNC: efficient and robust secure scheme for random linear network coding publication-title: Comput. Netw. – volume: 15 start-page: 641 year: 2016 end-page: 655 ident: bib0001 article-title: Delay-constrained high definition video transmission in heterogeneous wireless networks with multi-homed terminals publication-title: IEEE Trans. Mob. Comput. – volume: 52 start-page: 4413 year: 2006 end-page: 4430 ident: bib0018 article-title: A random linear network coding approach to multicast publication-title: IEEE Trans. Inf. Theory – start-page: 5127 year: 2013 end-page: 5131 ident: bib0017 article-title: Towards minimising the coefficient vector overhead in random linear network coding publication-title: Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP) – reference: K. Fouli, V.W.C. Chook, J. Heide, M. Médard, S.J. Shi, Random linear network coding (RLNC)-based symbol representation, in: draft-heide-nwcrg-rlnc-00, 2019. – start-page: 1 year: 2014 end-page: 4 ident: bib0016 article-title: Enhanced opportunistic random linear source/network coding with cross-layer techniques over wireless mesh networks publication-title: Wireless Days (WD), IFIP – start-page: 468 year: 2015 end-page: 473 ident: bib0008 article-title: Techniques to enhance security in SCTP for multi-homed networks publication-title: Proc. IEEE Global Conf. Communication Technologies (GCCT) – year: 2018 ident: bib0004 article-title: Security-aware cross-layer resource allocation for heterogeneous wireless networks publication-title: IEEE Trans. Commun. – start-page: 1 year: 2018 end-page: 12 ident: bib0002 article-title: Brains: joint bandwidth-relay allocation in multi-homing cooperative d2d networks publication-title: IEEE Trans. Veh. Technol. – year: 2018 ident: bib0029 article-title: One round cipher algorithm for multimedia IoT devices publication-title: Multimed. Tools Appl. – volume: 41 start-page: 40 year: 2003 end-page: 49 ident: bib0011 article-title: Practical network coding publication-title: Proceedings of the Annual Allerton Conference on Communication Control and Computing – start-page: 1 year: 2018 end-page: 6 ident: bib0003 article-title: Multi-homing in unlicensed LTE networks publication-title: IEEE Proc. International Conference on Communications (ICC) – volume: 2008 start-page: 179290 year: 2008 ident: bib0035 article-title: Overview on selective encryption of image and video: challenges and perspectives publication-title: EURASIP J. Inf. Secur. – start-page: 546 year: 2007 end-page: 550 ident: bib0022 article-title: Random linear network coding: a free cipher? publication-title: Information Theory, 2007. ISIT 2007. IEEE International Symposium on – start-page: 307 year: 2012 end-page: 312 ident: bib0024 article-title: A light-weight secure broadcast for delay-tolerant applications in single-hop wireless sensor networks publication-title: Proc. IEEE International eConference on Computer and Knowledge Engineering (ICCKE) – start-page: 1 year: 2018 end-page: 6 ident: bib0015 article-title: A fairness-based congestion control algorithm for multipath TCP publication-title: 2018 IEEE Wireless Communications and Networking Conference (WCNC) – volume: 6 start-page: 101 year: 2011 end-page: 111 ident: bib0020 article-title: A source authentication scheme using network coding publication-title: Int. J. Secur. Netw. – start-page: 1 year: 2018 end-page: 17 ident: bib0025 article-title: A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach publication-title: Mob. Netw. Appl. – volume: 32 start-page: 1 year: 2019 end-page: 30 ident: bib0031 article-title: A survey on OFDM physical layer security publication-title: Phys. Commun. – volume: 24 start-page: 1943 year: 2012 end-page: 1950 ident: bib0019 article-title: Secure communication with network coding publication-title: Phys. Procedia – start-page: 2103 year: 2015 end-page: 2108 ident: bib0014 article-title: Erdia: An efficient and robust data integrity algorithm for mobile and wireless networks publication-title: Wireless Communications and Networking Conference (WCNC), 2015 IEEE – volume: 136 start-page: 5 year: 2018 end-page: 8 ident: bib0033 article-title: Differential-linear and related key cryptanalysis of round-reduced scream publication-title: Inf. Process. Lett. – year: 2018 ident: bib0026 article-title: An efficient OFDM-based encryption scheme using a dynamic key approach publication-title: IEEE Internet Things J. – volume: 25 start-page: 2211 year: 2013 end-page: 2221 ident: bib0012 article-title: A lightweight encryption scheme for network-coded mobile ad hoc networks publication-title: IEEE Trans. Parallel Distrib. Syst. – volume: 66 start-page: 5520 year: 2018 end-page: 5533 ident: bib0030 article-title: Vandermonde factorization of Hankel matrix for complex exponential signal recovery-application in fast NMR spectroscopy publication-title: IEEE Trans. Signal Process. – year: 2018 ident: bib0005 article-title: Game theoretical secure caching scheme in multi-homing edge computing-enabled heterogeneous networks publication-title: IEEE Internet Things J. – volume: 41 start-page: 40 year: 2003 ident: 10.1016/j.comnet.2019.106886_bib0011 article-title: Practical network coding – start-page: 468 year: 2015 ident: 10.1016/j.comnet.2019.106886_bib0008 article-title: Techniques to enhance security in SCTP for multi-homed networks – year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0005 article-title: Game theoretical secure caching scheme in multi-homing edge computing-enabled heterogeneous networks publication-title: IEEE Internet Things J. – volume: 28 start-page: 1 year: 2009 ident: 10.1016/j.comnet.2019.106886_bib0006 article-title: Site-controlled secure multi-homing and traffic engineering for IP publication-title: MILCOM 2009-2009 IEEE Military Communications Conference – start-page: 401 year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0034 article-title: Enhancing data security using obfuscated 128-bit AES algorithm-an active hardware obfuscation approach at RTL level – volume: 2008 start-page: 179290 issue: 1 year: 2008 ident: 10.1016/j.comnet.2019.106886_bib0035 article-title: Overview on selective encryption of image and video: challenges and perspectives publication-title: EURASIP J. Inf. Secur. – volume: 32 start-page: 1 year: 2019 ident: 10.1016/j.comnet.2019.106886_bib0031 article-title: A survey on OFDM physical layer security publication-title: Phys. Commun. doi: 10.1016/j.phycom.2018.10.008 – volume: 24 start-page: 1943 year: 2012 ident: 10.1016/j.comnet.2019.106886_bib0019 article-title: Secure communication with network coding publication-title: Phys. Procedia doi: 10.1016/j.phpro.2012.02.286 – year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0029 article-title: One round cipher algorithm for multimedia IoT devices publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-018-5660-y – year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0004 article-title: Security-aware cross-layer resource allocation for heterogeneous wireless networks publication-title: IEEE Trans. Commun. – volume: 78 start-page: 16527 issue: 12 year: 2019 ident: 10.1016/j.comnet.2019.106886_bib0028 article-title: Lightweight, dynamic and efficient image encryption scheme publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-018-7000-7 – volume: 25 start-page: 2211 issue: 9 year: 2013 ident: 10.1016/j.comnet.2019.106886_bib0012 article-title: A lightweight encryption scheme for network-coded mobile ad hoc networks publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2013.161 – start-page: 1 year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0015 article-title: A fairness-based congestion control algorithm for multipath TCP – start-page: 5127 year: 2013 ident: 10.1016/j.comnet.2019.106886_bib0017 article-title: Towards minimising the coefficient vector overhead in random linear network coding – volume: 42 start-page: 59 issue: 1 year: 1988 ident: 10.1016/j.comnet.2019.106886_bib0032 article-title: Thirteen ways to look at the correlation coefficient publication-title: Am. Stat. doi: 10.1080/00031305.1988.10475524 – start-page: 1 year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0002 article-title: Brains: joint bandwidth-relay allocation in multi-homing cooperative d2d networks publication-title: IEEE Trans. Veh. Technol. – start-page: 307 year: 2012 ident: 10.1016/j.comnet.2019.106886_bib0024 article-title: A light-weight secure broadcast for delay-tolerant applications in single-hop wireless sensor networks – volume: 66 start-page: 5520 issue: 21 year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0030 article-title: Vandermonde factorization of Hankel matrix for complex exponential signal recovery-application in fast NMR spectroscopy publication-title: IEEE Trans. Signal Process. doi: 10.1109/TSP.2018.2869122 – start-page: 546 year: 2007 ident: 10.1016/j.comnet.2019.106886_bib0022 article-title: Random linear network coding: a free cipher? – volume: 15 start-page: 641 issue: 3 year: 2016 ident: 10.1016/j.comnet.2019.106886_bib0001 article-title: Delay-constrained high definition video transmission in heterogeneous wireless networks with multi-homed terminals publication-title: IEEE Trans. Mob. Comput. doi: 10.1109/TMC.2015.2426710 – year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0009 article-title: A framework for evaluating physical-layer network coding gains in multi-hop wireless networks publication-title: IEEE Trans. Mob. Comput. – start-page: 246 year: 2011 ident: 10.1016/j.comnet.2019.106886_bib0021 article-title: On enhancing the random linear network coding – start-page: 1 year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0003 article-title: Multi-homing in unlicensed LTE networks – start-page: 2103 year: 2015 ident: 10.1016/j.comnet.2019.106886_bib0014 article-title: Erdia: An efficient and robust data integrity algorithm for mobile and wireless networks – year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0026 article-title: An efficient OFDM-based encryption scheme using a dynamic key approach publication-title: IEEE Internet Things J. – volume: 75 start-page: 99 year: 2014 ident: 10.1016/j.comnet.2019.106886_bib0013 article-title: ERSS-RLNC: efficient and robust secure scheme for random linear network coding publication-title: Comput. Netw. doi: 10.1016/j.comnet.2014.09.013 – start-page: 1 year: 2014 ident: 10.1016/j.comnet.2019.106886_bib0016 article-title: Enhanced opportunistic random linear source/network coding with cross-layer techniques over wireless mesh networks – volume: 6 start-page: 101 issue: 2–3 year: 2011 ident: 10.1016/j.comnet.2019.106886_bib0020 article-title: A source authentication scheme using network coding publication-title: Int. J. Secur. Netw. doi: 10.1504/IJSN.2011.043669 – start-page: 1267 year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0027 article-title: Efficient and secure physical encryption scheme for low-power wireless M2M devices – ident: 10.1016/j.comnet.2019.106886_bib0010 – volume: 136 start-page: 5 year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0033 article-title: Differential-linear and related key cryptanalysis of round-reduced scream publication-title: Inf. Process. Lett. doi: 10.1016/j.ipl.2018.03.010 – start-page: 1 year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0025 article-title: A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach publication-title: Mob. Netw. Appl. – start-page: 1 year: 2011 ident: 10.1016/j.comnet.2019.106886_bib0007 article-title: Securing the backhaul for mobile and multi-homed femtocells – volume: 6 start-page: 26059 year: 2018 ident: 10.1016/j.comnet.2019.106886_bib0023 article-title: A network coding and DES based dynamic encryption scheme for moving target defense publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2832854 – volume: 52 start-page: 4413 issue: 10 year: 2006 ident: 10.1016/j.comnet.2019.106886_bib0018 article-title: A random linear network coding approach to multicast publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.2006.881746 |
| SSID | ssj0004428 |
| Score | 2.321185 |
| Snippet | Multi-homing is a new mechanism that enables hosts with multiple network interfaces (IP addresses), to connect to more than one data link. This technology... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 106886 |
| SubjectTerms | Algorithms Coding Communications systems Computer mediated communication Confidentiality Cryptography Data Data compression Data encryption Encoding Encryption Homing Interfaces Internet IP (Internet Protocol) Lightweight encryption-authentication scheme Matrices Multicasting Networks Permutations Physical characteristics Physical properties Random linear network coding Reliability Secure multi-homed networks Security Telecommunications Wireless communication systems |
| Title | Design and realization of efficient & secure multi-homed systems based on random linear network coding |
| URI | https://dx.doi.org/10.1016/j.comnet.2019.106886 https://www.proquest.com/docview/2322649037 |
| Volume | 163 |
| WOSCitedRecordID | wos000492797800011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-7069 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0004428 issn: 1389-1286 databaseCode: AIEXJ dateStart: 19990114 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Nb9MwFLdKxwEOiE9tMJAPjEsUlMZJbR8r1mqgrSDWod6sJLa1Tm3Std20P5A_jOePpBEMBgcuUeXGTev363s_P78PhN5GEmxwStKQZToJk0yxMGfMbFUSRSTjmtkMuW_HdDxm0yn_0ul8r3Nhrue0LNnNDV_-V1HDGAjbpM7-g7ibD4UBeA1ChyuIHa5_JfhDG5Ph4saBBfo8S0MKlS0X4WqM9oO18bQrF1EYnpskfF_WeR0Y0ybNMQIYMlktAkNFs1VQupDxoKgag1fXOPC9IepbrCt3sDBFGKRH3Dax2HshOG95IcbwyyyNPQIyDyqnOSA6UXPXWPur8k5m6z6fu6zuk-o8WywyuQ1SMIXHXeLOrO3Q6HGb2bdVm02mzam6vKpmWXD6ftBS0ECwQrCpvny2G2MUdgmRa_nSaHWvN51e7t1qLZzj4sIIG5bHxPlxGOyz24pzjz-L0dnxsZgMp5MDMlpehqZzmTnhPyCHDkX30E5MU866aGfwcTj9tM3PTWyP3-a71ymcNs7w14f_jiL9RBYsA5o8Ro_81gUPHOSeoI4qn6KHrYKWz5B24MMgZtwCH640bsCH32EHPdyCHvbQwxZ6GKY46GEHPexxhR30nqOz0XDy4Sj0nTzCgpBkE6bUnNYqlucpzZK46MUZVVrGCZOEaM2kppJEPM4UB76uuSSS5FpGsaZJpPopeYG6ZVWqXYR5DiSTJYRpYPJSc9bXvIhVL1YJS1me7iFSL54ofJl7021lLup4xgvhllyYJRduyfdQ2MxaujIvd9xPa7kIT1UdBRWArTtm7tdiFF5rrAVsa2BjwiNCX_757VfowfYvs4-6m9WVeo3uF9eb2Xr1xuPuB0kDvYA |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Design+and+realization+of+efficient+%26+secure+multi-homed+systems+based+on+random+linear+network+coding&rft.jtitle=Computer+networks+%28Amsterdam%2C+Netherlands+%3A+1999%29&rft.au=Noura%2C+Hassan+N&rft.au=Melki%2C+Reem&rft.au=Malli%2C+Mohammad&rft.au=Chehab%2C+Ali&rft.date=2019-11-09&rft.pub=Elsevier+Sequoia+S.A&rft.issn=1389-1286&rft.eissn=1872-7069&rft.volume=163&rft.spage=1&rft_id=info:doi/10.1016%2Fj.comnet.2019.106886&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1389-1286&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1389-1286&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1389-1286&client=summon |