Design and realization of efficient & secure multi-homed systems based on random linear network coding

Multi-homing is a new mechanism that enables hosts with multiple network interfaces (IP addresses), to connect to more than one data link. This technology enhances Internet connectivity and reliability without compromising efficient performance. Like any communication system, the security of multi-h...

Full description

Saved in:
Bibliographic Details
Published in:Computer networks (Amsterdam, Netherlands : 1999) Vol. 163; p. 106886
Main Authors: Noura, Hassan N., Melki, Reem, Malli, Mohammad, Chehab, Ali
Format: Journal Article
Language:English
Published: Amsterdam Elsevier B.V 09.11.2019
Elsevier Sequoia S.A
Subjects:
ISSN:1389-1286, 1872-7069
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Multi-homing is a new mechanism that enables hosts with multiple network interfaces (IP addresses), to connect to more than one data link. This technology enhances Internet connectivity and reliability without compromising efficient performance. Like any communication system, the security of multi-homed systems is of great importance. However, this issue remains largely un-attempted, where only few papers in the literature discuss, address and present security solutions for multi-homed systems. On the other hand, Random Linear Network Coding (RLNC) has recently emerged as a new coding technique that aims at improving system performance by efficiently transmitting and compressing data in general multi-source multicast networks. In this paper, a data confidentiality and availability scheme based on RNLC, is proposed for multi-homed systems. The proposed solution exploits the random physical characteristics of wireless channels, along with a pre-shared secret key, to derive dynamic keys which are used to generate random and dynamic cryptographic primitives. These primitives mainly include two permutation tables and a set of secret invertible RLNC matrices, all of which change for every input message. It has been shown that by securing the cryptographic primitives needed in the ciphering/deciphering process, one can jointly enhance the security and performance of transmitted data in multi-homed systems. Finally, security and performance analysis are presented to validate the efficiency and security of the proposed encryption/encoding scheme.
AbstractList Multi-homing is a new mechanism that enables hosts with multiple network interfaces (IP addresses), to connect to more than one data link. This technology enhances Internet connectivity and reliability without compromising efficient performance. Like any communication system, the security of multi-homed systems is of great importance. However, this issue remains largely un-attempted, where only few papers in the literature discuss, address and present security solutions for multi-homed systems. On the other hand, Random Linear Network Coding (RLNC) has recently emerged as a new coding technique that aims at improving system performance by efficiently transmitting and compressing data in general multi-source multicast networks. In this paper, a data confidentiality and availability scheme based on RNLC, is proposed for multi-homed systems. The proposed solution exploits the random physical characteristics of wireless channels, along with a pre-shared secret key, to derive dynamic keys which are used to generate random and dynamic cryptographic primitives. These primitives mainly include two permutation tables and a set of secret invertible RLNC matrices, all of which change for every input message. It has been shown that by securing the cryptographic primitives needed in the ciphering/deciphering process, one can jointly enhance the security and performance of transmitted data in multi-homed systems. Finally, security and performance analysis are presented to validate the efficiency and security of the proposed encryption/encoding scheme.
ArticleNumber 106886
Author Noura, Hassan N.
Melki, Reem
Malli, Mohammad
Chehab, Ali
Author_xml – sequence: 1
  givenname: Hassan N.
  surname: Noura
  fullname: Noura, Hassan N.
  email: hn49@aub.edu.lb
  organization: American University of Beirut Department of Electrical and Computer Engineering, Lebanon
– sequence: 2
  givenname: Reem
  surname: Melki
  fullname: Melki, Reem
  email: rmm71@aub.edu.lb
  organization: American University of Beirut Department of Electrical and Computer Engineering, Lebanon
– sequence: 3
  givenname: Mohammad
  surname: Malli
  fullname: Malli, Mohammad
  email: mmalli@aou.edu.lb
  organization: Arab Open University, Department of Computer Sciences, Lebanon
– sequence: 4
  givenname: Ali
  surname: Chehab
  fullname: Chehab, Ali
  email: chehab@aub.edu.lb
  organization: American University of Beirut Department of Electrical and Computer Engineering, Lebanon
BookMark eNqFkE1PGzEQhi0EEhD4BxwsIXHb1B-bXbuHSghKQYrEBc6WY4-p0107tR2q9NfjsJx6KCd_aJ53Zp5TdBhiAIQuKJlTQrsv67mJY4AyZ4TK-tUJ0R2gEyp61vSkk4f1zoVsKBPdMTrNeU0IaVsmTpC7hexfAtbB4gR68H918THg6DA4542HUPAVzmC2CfC4HYpvfsYRLM67XGDMeKVzfVUk1Yw44sEH0AnXcf7E9AubaH14OUNHTg8Zzj_OGXq--_50c98sH3883FwvG8N5W5pFT-WCg1itFr1umaFM9-Asa4Xl3DlhXW85kUyD5JI5abnlK2cJc31LoFvwGbqccjcp_t5CLmodtynUlopxxrpWEt7Xqq9TlUkx5wROGV_e9y5J-0FRovZe1VpNXtXeq5q8Vrj9B94kP-q0-wz7NmFQ13_1kFTeyzVgfQJTlI3-_wFvsBmXWQ
CitedBy_id crossref_primary_10_1016_j_micpro_2020_103201
crossref_primary_10_1016_j_jisa_2022_103165
crossref_primary_10_1007_s13198_021_01402_6
crossref_primary_10_1016_j_adhoc_2022_102928
Cites_doi 10.1016/j.phycom.2018.10.008
10.1016/j.phpro.2012.02.286
10.1007/s11042-018-5660-y
10.1007/s11042-018-7000-7
10.1109/TPDS.2013.161
10.1080/00031305.1988.10475524
10.1109/TSP.2018.2869122
10.1109/TMC.2015.2426710
10.1016/j.comnet.2014.09.013
10.1504/IJSN.2011.043669
10.1016/j.ipl.2018.03.010
10.1109/ACCESS.2018.2832854
10.1109/TIT.2006.881746
ContentType Journal Article
Copyright 2019
Copyright Elsevier Sequoia S.A. Nov 9, 2019
Copyright_xml – notice: 2019
– notice: Copyright Elsevier Sequoia S.A. Nov 9, 2019
DBID AAYXX
CITATION
7SC
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
DOI 10.1016/j.comnet.2019.106886
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Library and Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1872-7069
ExternalDocumentID 10_1016_j_comnet_2019_106886
S1389128619301501
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
6OB
7-5
71M
77K
8P~
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABMAC
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
IHE
J1W
JJJVA
KOM
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
PQQKQ
Q38
RIG
ROL
RPZ
RXW
SDF
SDG
SDP
SES
SPC
SPCBC
SST
SSV
SSZ
T5K
TAE
TN5
ZMT
~G-
29F
77I
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABFNM
ABJNI
ABXDB
ACLOT
ACNNM
ACVFH
ADCNI
ADJOM
AEIPS
AEUPX
AFJKZ
AFPUW
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
F0J
FGOYB
HZ~
R2-
SEW
ZY4
~HD
7SC
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c334t-571953e8bb57a42c12a7efd248d33ff8df7d3092ae9392f9d3d3bfd02f740e653
ISICitedReferencesCount 6
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000492797800011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1389-1286
IngestDate Fri Nov 14 19:19:05 EST 2025
Sat Nov 29 07:03:55 EST 2025
Tue Nov 18 21:18:57 EST 2025
Fri Feb 23 02:26:21 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Random linear network coding
Lightweight encryption-authentication scheme
Secure multi-homed networks
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c334t-571953e8bb57a42c12a7efd248d33ff8df7d3092ae9392f9d3d3bfd02f740e653
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2322649037
PQPubID 47119
ParticipantIDs proquest_journals_2322649037
crossref_citationtrail_10_1016_j_comnet_2019_106886
crossref_primary_10_1016_j_comnet_2019_106886
elsevier_sciencedirect_doi_10_1016_j_comnet_2019_106886
PublicationCentury 2000
PublicationDate 2019-11-09
PublicationDateYYYYMMDD 2019-11-09
PublicationDate_xml – month: 11
  year: 2019
  text: 2019-11-09
  day: 09
PublicationDecade 2010
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Computer networks (Amsterdam, Netherlands : 1999)
PublicationYear 2019
Publisher Elsevier B.V
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier B.V
– name: Elsevier Sequoia S.A
References Nasiraee, Mohasefi (bib0024) 2012
Noura, Melki, Chehab, Mansour, Martin (bib0027) 2018
Chen, Wu, Dai, Huang (bib0002) 2018
Noura, Hussein, Martin, Boukhatem, Al Agha (bib0014) 2015
Chhabra, Lata (bib0034) 2018
Massoudi, Lefebvre, De Vleeschouwer, Macq, Quisquater (bib0035) 2008; 2008
Noura, Chehab, Noura, Couturier, Mansour (bib0028) 2019; 78
Noura, Chehab, Sleem, Noura, Couturier, Mansour (bib0029) 2018
Xu, Xing, Nallanathan, Yang, Chai (bib0004) 2018
Lee Rodgers, Nicewander (bib0032) 1988; 42
de Alwis, Arachchi, Fernando, Kondoz (bib0017) 2013
Naves (bib0009) 2018
Chou, Wu, Jain (bib0011) 2003; 41
Ying, Cai, Guo, Tang, Chen, Qu (bib0030) 2018; 66
Melki, Mansour, Chehab (bib0015) 2018
Najeem, Murthy (bib0021) 2011
Melki, Noura, Mansour, Chehab (bib0031) 2019; 32
Wu, Yuen, Cheung, Chen (bib0001) 2016; 15
Namal, Gurtov, Bennis (bib0007) 2011
Atkinson, Bhatti, Hailes (bib0006) 2009; 28
Venkadesh, Dhas, Divya (bib0008) 2015
Xu, Su, Zheng, Luo, Dong, Zhang (bib0005) 2018
Dwivedi, Morawiecki, Singh, Dhar (bib0033) 2018; 136
Lima, Médard, Barros (bib0022) 2007
Zhang, Lin, Jiang, Fan, Shen (bib0012) 2013; 25
Melki, Noura, Mansour, Chehab (bib0026) 2018
Gómez, Garrido, Rodríguez, Agüero, Muñoz (bib0016) 2014
Noura, Melki, Chehab, Mansour (bib0025) 2018
Wang, Chen, Yu (bib0003) 2018
Noura, Martin, Agha, Chahine (bib0013) 2014; 75
Tang, Sun, Yang, Long (bib0023) 2018; 6
Fathy, ElBatt, Youssef (bib0020) 2011; 6
K. Fouli, V.W.C. Chook, J. Heide, M. Médard, S.J. Shi, Random linear network coding (RLNC)-based symbol representation, in: draft-heide-nwcrg-rlnc-00, 2019.
Ho, Médard, Koetter, Karger, Effros, Shi, Leong (bib0018) 2006; 52
Cao, Tang, Luo (bib0019) 2012; 24
Zhang (10.1016/j.comnet.2019.106886_bib0012) 2013; 25
Xu (10.1016/j.comnet.2019.106886_bib0004) 2018
Naves (10.1016/j.comnet.2019.106886_bib0009) 2018
Chou (10.1016/j.comnet.2019.106886_bib0011) 2003; 41
Lima (10.1016/j.comnet.2019.106886_bib0022) 2007
Wang (10.1016/j.comnet.2019.106886_bib0003) 2018
Ying (10.1016/j.comnet.2019.106886_bib0030) 2018; 66
Melki (10.1016/j.comnet.2019.106886_bib0031) 2019; 32
Melki (10.1016/j.comnet.2019.106886_bib0026) 2018
Noura (10.1016/j.comnet.2019.106886_bib0014) 2015
Gómez (10.1016/j.comnet.2019.106886_bib0016) 2014
Noura (10.1016/j.comnet.2019.106886_bib0029) 2018
Noura (10.1016/j.comnet.2019.106886_bib0013) 2014; 75
Cao (10.1016/j.comnet.2019.106886_bib0019) 2012; 24
Nasiraee (10.1016/j.comnet.2019.106886_bib0024) 2012
Namal (10.1016/j.comnet.2019.106886_bib0007) 2011
Venkadesh (10.1016/j.comnet.2019.106886_bib0008) 2015
Atkinson (10.1016/j.comnet.2019.106886_bib0006) 2009; 28
Noura (10.1016/j.comnet.2019.106886_bib0027) 2018
10.1016/j.comnet.2019.106886_bib0010
Massoudi (10.1016/j.comnet.2019.106886_bib0035) 2008; 2008
Xu (10.1016/j.comnet.2019.106886_bib0005) 2018
Noura (10.1016/j.comnet.2019.106886_bib0025) 2018
de Alwis (10.1016/j.comnet.2019.106886_bib0017) 2013
Wu (10.1016/j.comnet.2019.106886_bib0001) 2016; 15
Tang (10.1016/j.comnet.2019.106886_bib0023) 2018; 6
Fathy (10.1016/j.comnet.2019.106886_bib0020) 2011; 6
Lee Rodgers (10.1016/j.comnet.2019.106886_bib0032) 1988; 42
Dwivedi (10.1016/j.comnet.2019.106886_bib0033) 2018; 136
Melki (10.1016/j.comnet.2019.106886_bib0015) 2018
Chen (10.1016/j.comnet.2019.106886_bib0002) 2018
Ho (10.1016/j.comnet.2019.106886_bib0018) 2006; 52
Noura (10.1016/j.comnet.2019.106886_bib0028) 2019; 78
Najeem (10.1016/j.comnet.2019.106886_bib0021) 2011
Chhabra (10.1016/j.comnet.2019.106886_bib0034) 2018
References_xml – volume: 78
  start-page: 16527
  year: 2019
  end-page: 16561
  ident: bib0028
  article-title: Lightweight, dynamic and efficient image encryption scheme
  publication-title: Multimed. Tools Appl.
– start-page: 1267
  year: 2018
  end-page: 1272
  ident: bib0027
  article-title: Efficient and secure physical encryption scheme for low-power wireless M2M devices
  publication-title: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)
– volume: 28
  start-page: 1
  year: 2009
  end-page: 10
  ident: bib0006
  article-title: Site-controlled secure multi-homing and traffic engineering for IP
  publication-title: MILCOM 2009-2009 IEEE Military Communications Conference
– start-page: 1
  year: 2011
  end-page: 15
  ident: bib0007
  article-title: Securing the backhaul for mobile and multi-homed femtocells
  publication-title: IEEE Proc. Future Network & Mobile Summit (FutureNetw)
– start-page: 246
  year: 2011
  end-page: 251
  ident: bib0021
  article-title: On enhancing the random linear network coding
  publication-title: Networks (ICON), 2011 17th IEEE International Conference on
– start-page: 401
  year: 2018
  end-page: 406
  ident: bib0034
  article-title: Enhancing data security using obfuscated 128-bit AES algorithm-an active hardware obfuscation approach at RTL level
  publication-title: IEEE proc. International Conference on Advances in Computing, Communications and Informatics (ICACCI)
– year: 2018
  ident: bib0009
  article-title: A framework for evaluating physical-layer network coding gains in multi-hop wireless networks
  publication-title: IEEE Trans. Mob. Comput.
– volume: 42
  start-page: 59
  year: 1988
  end-page: 66
  ident: bib0032
  article-title: Thirteen ways to look at the correlation coefficient
  publication-title: Am. Stat.
– volume: 6
  start-page: 26059
  year: 2018
  end-page: 26068
  ident: bib0023
  article-title: A network coding and DES based dynamic encryption scheme for moving target defense
  publication-title: IEEE Access
– volume: 75
  start-page: 99
  year: 2014
  end-page: 112
  ident: bib0013
  article-title: ERSS-RLNC: efficient and robust secure scheme for random linear network coding
  publication-title: Comput. Netw.
– volume: 15
  start-page: 641
  year: 2016
  end-page: 655
  ident: bib0001
  article-title: Delay-constrained high definition video transmission in heterogeneous wireless networks with multi-homed terminals
  publication-title: IEEE Trans. Mob. Comput.
– volume: 52
  start-page: 4413
  year: 2006
  end-page: 4430
  ident: bib0018
  article-title: A random linear network coding approach to multicast
  publication-title: IEEE Trans. Inf. Theory
– start-page: 5127
  year: 2013
  end-page: 5131
  ident: bib0017
  article-title: Towards minimising the coefficient vector overhead in random linear network coding
  publication-title: Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP)
– reference: K. Fouli, V.W.C. Chook, J. Heide, M. Médard, S.J. Shi, Random linear network coding (RLNC)-based symbol representation, in: draft-heide-nwcrg-rlnc-00, 2019.
– start-page: 1
  year: 2014
  end-page: 4
  ident: bib0016
  article-title: Enhanced opportunistic random linear source/network coding with cross-layer techniques over wireless mesh networks
  publication-title: Wireless Days (WD), IFIP
– start-page: 468
  year: 2015
  end-page: 473
  ident: bib0008
  article-title: Techniques to enhance security in SCTP for multi-homed networks
  publication-title: Proc. IEEE Global Conf. Communication Technologies (GCCT)
– year: 2018
  ident: bib0004
  article-title: Security-aware cross-layer resource allocation for heterogeneous wireless networks
  publication-title: IEEE Trans. Commun.
– start-page: 1
  year: 2018
  end-page: 12
  ident: bib0002
  article-title: Brains: joint bandwidth-relay allocation in multi-homing cooperative d2d networks
  publication-title: IEEE Trans. Veh. Technol.
– year: 2018
  ident: bib0029
  article-title: One round cipher algorithm for multimedia IoT devices
  publication-title: Multimed. Tools Appl.
– volume: 41
  start-page: 40
  year: 2003
  end-page: 49
  ident: bib0011
  article-title: Practical network coding
  publication-title: Proceedings of the Annual Allerton Conference on Communication Control and Computing
– start-page: 1
  year: 2018
  end-page: 6
  ident: bib0003
  article-title: Multi-homing in unlicensed LTE networks
  publication-title: IEEE Proc. International Conference on Communications (ICC)
– volume: 2008
  start-page: 179290
  year: 2008
  ident: bib0035
  article-title: Overview on selective encryption of image and video: challenges and perspectives
  publication-title: EURASIP J. Inf. Secur.
– start-page: 546
  year: 2007
  end-page: 550
  ident: bib0022
  article-title: Random linear network coding: a free cipher?
  publication-title: Information Theory, 2007. ISIT 2007. IEEE International Symposium on
– start-page: 307
  year: 2012
  end-page: 312
  ident: bib0024
  article-title: A light-weight secure broadcast for delay-tolerant applications in single-hop wireless sensor networks
  publication-title: Proc. IEEE International eConference on Computer and Knowledge Engineering (ICCKE)
– start-page: 1
  year: 2018
  end-page: 6
  ident: bib0015
  article-title: A fairness-based congestion control algorithm for multipath TCP
  publication-title: 2018 IEEE Wireless Communications and Networking Conference (WCNC)
– volume: 6
  start-page: 101
  year: 2011
  end-page: 111
  ident: bib0020
  article-title: A source authentication scheme using network coding
  publication-title: Int. J. Secur. Netw.
– start-page: 1
  year: 2018
  end-page: 17
  ident: bib0025
  article-title: A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach
  publication-title: Mob. Netw. Appl.
– volume: 32
  start-page: 1
  year: 2019
  end-page: 30
  ident: bib0031
  article-title: A survey on OFDM physical layer security
  publication-title: Phys. Commun.
– volume: 24
  start-page: 1943
  year: 2012
  end-page: 1950
  ident: bib0019
  article-title: Secure communication with network coding
  publication-title: Phys. Procedia
– start-page: 2103
  year: 2015
  end-page: 2108
  ident: bib0014
  article-title: Erdia: An efficient and robust data integrity algorithm for mobile and wireless networks
  publication-title: Wireless Communications and Networking Conference (WCNC), 2015 IEEE
– volume: 136
  start-page: 5
  year: 2018
  end-page: 8
  ident: bib0033
  article-title: Differential-linear and related key cryptanalysis of round-reduced scream
  publication-title: Inf. Process. Lett.
– year: 2018
  ident: bib0026
  article-title: An efficient OFDM-based encryption scheme using a dynamic key approach
  publication-title: IEEE Internet Things J.
– volume: 25
  start-page: 2211
  year: 2013
  end-page: 2221
  ident: bib0012
  article-title: A lightweight encryption scheme for network-coded mobile ad hoc networks
  publication-title: IEEE Trans. Parallel Distrib. Syst.
– volume: 66
  start-page: 5520
  year: 2018
  end-page: 5533
  ident: bib0030
  article-title: Vandermonde factorization of Hankel matrix for complex exponential signal recovery-application in fast NMR spectroscopy
  publication-title: IEEE Trans. Signal Process.
– year: 2018
  ident: bib0005
  article-title: Game theoretical secure caching scheme in multi-homing edge computing-enabled heterogeneous networks
  publication-title: IEEE Internet Things J.
– volume: 41
  start-page: 40
  year: 2003
  ident: 10.1016/j.comnet.2019.106886_bib0011
  article-title: Practical network coding
– start-page: 468
  year: 2015
  ident: 10.1016/j.comnet.2019.106886_bib0008
  article-title: Techniques to enhance security in SCTP for multi-homed networks
– year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0005
  article-title: Game theoretical secure caching scheme in multi-homing edge computing-enabled heterogeneous networks
  publication-title: IEEE Internet Things J.
– volume: 28
  start-page: 1
  year: 2009
  ident: 10.1016/j.comnet.2019.106886_bib0006
  article-title: Site-controlled secure multi-homing and traffic engineering for IP
  publication-title: MILCOM 2009-2009 IEEE Military Communications Conference
– start-page: 401
  year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0034
  article-title: Enhancing data security using obfuscated 128-bit AES algorithm-an active hardware obfuscation approach at RTL level
– volume: 2008
  start-page: 179290
  issue: 1
  year: 2008
  ident: 10.1016/j.comnet.2019.106886_bib0035
  article-title: Overview on selective encryption of image and video: challenges and perspectives
  publication-title: EURASIP J. Inf. Secur.
– volume: 32
  start-page: 1
  year: 2019
  ident: 10.1016/j.comnet.2019.106886_bib0031
  article-title: A survey on OFDM physical layer security
  publication-title: Phys. Commun.
  doi: 10.1016/j.phycom.2018.10.008
– volume: 24
  start-page: 1943
  year: 2012
  ident: 10.1016/j.comnet.2019.106886_bib0019
  article-title: Secure communication with network coding
  publication-title: Phys. Procedia
  doi: 10.1016/j.phpro.2012.02.286
– year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0029
  article-title: One round cipher algorithm for multimedia IoT devices
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-018-5660-y
– year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0004
  article-title: Security-aware cross-layer resource allocation for heterogeneous wireless networks
  publication-title: IEEE Trans. Commun.
– volume: 78
  start-page: 16527
  issue: 12
  year: 2019
  ident: 10.1016/j.comnet.2019.106886_bib0028
  article-title: Lightweight, dynamic and efficient image encryption scheme
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-018-7000-7
– volume: 25
  start-page: 2211
  issue: 9
  year: 2013
  ident: 10.1016/j.comnet.2019.106886_bib0012
  article-title: A lightweight encryption scheme for network-coded mobile ad hoc networks
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2013.161
– start-page: 1
  year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0015
  article-title: A fairness-based congestion control algorithm for multipath TCP
– start-page: 5127
  year: 2013
  ident: 10.1016/j.comnet.2019.106886_bib0017
  article-title: Towards minimising the coefficient vector overhead in random linear network coding
– volume: 42
  start-page: 59
  issue: 1
  year: 1988
  ident: 10.1016/j.comnet.2019.106886_bib0032
  article-title: Thirteen ways to look at the correlation coefficient
  publication-title: Am. Stat.
  doi: 10.1080/00031305.1988.10475524
– start-page: 1
  year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0002
  article-title: Brains: joint bandwidth-relay allocation in multi-homing cooperative d2d networks
  publication-title: IEEE Trans. Veh. Technol.
– start-page: 307
  year: 2012
  ident: 10.1016/j.comnet.2019.106886_bib0024
  article-title: A light-weight secure broadcast for delay-tolerant applications in single-hop wireless sensor networks
– volume: 66
  start-page: 5520
  issue: 21
  year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0030
  article-title: Vandermonde factorization of Hankel matrix for complex exponential signal recovery-application in fast NMR spectroscopy
  publication-title: IEEE Trans. Signal Process.
  doi: 10.1109/TSP.2018.2869122
– start-page: 546
  year: 2007
  ident: 10.1016/j.comnet.2019.106886_bib0022
  article-title: Random linear network coding: a free cipher?
– volume: 15
  start-page: 641
  issue: 3
  year: 2016
  ident: 10.1016/j.comnet.2019.106886_bib0001
  article-title: Delay-constrained high definition video transmission in heterogeneous wireless networks with multi-homed terminals
  publication-title: IEEE Trans. Mob. Comput.
  doi: 10.1109/TMC.2015.2426710
– year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0009
  article-title: A framework for evaluating physical-layer network coding gains in multi-hop wireless networks
  publication-title: IEEE Trans. Mob. Comput.
– start-page: 246
  year: 2011
  ident: 10.1016/j.comnet.2019.106886_bib0021
  article-title: On enhancing the random linear network coding
– start-page: 1
  year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0003
  article-title: Multi-homing in unlicensed LTE networks
– start-page: 2103
  year: 2015
  ident: 10.1016/j.comnet.2019.106886_bib0014
  article-title: Erdia: An efficient and robust data integrity algorithm for mobile and wireless networks
– year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0026
  article-title: An efficient OFDM-based encryption scheme using a dynamic key approach
  publication-title: IEEE Internet Things J.
– volume: 75
  start-page: 99
  year: 2014
  ident: 10.1016/j.comnet.2019.106886_bib0013
  article-title: ERSS-RLNC: efficient and robust secure scheme for random linear network coding
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2014.09.013
– start-page: 1
  year: 2014
  ident: 10.1016/j.comnet.2019.106886_bib0016
  article-title: Enhanced opportunistic random linear source/network coding with cross-layer techniques over wireless mesh networks
– volume: 6
  start-page: 101
  issue: 2–3
  year: 2011
  ident: 10.1016/j.comnet.2019.106886_bib0020
  article-title: A source authentication scheme using network coding
  publication-title: Int. J. Secur. Netw.
  doi: 10.1504/IJSN.2011.043669
– start-page: 1267
  year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0027
  article-title: Efficient and secure physical encryption scheme for low-power wireless M2M devices
– ident: 10.1016/j.comnet.2019.106886_bib0010
– volume: 136
  start-page: 5
  year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0033
  article-title: Differential-linear and related key cryptanalysis of round-reduced scream
  publication-title: Inf. Process. Lett.
  doi: 10.1016/j.ipl.2018.03.010
– start-page: 1
  year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0025
  article-title: A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach
  publication-title: Mob. Netw. Appl.
– start-page: 1
  year: 2011
  ident: 10.1016/j.comnet.2019.106886_bib0007
  article-title: Securing the backhaul for mobile and multi-homed femtocells
– volume: 6
  start-page: 26059
  year: 2018
  ident: 10.1016/j.comnet.2019.106886_bib0023
  article-title: A network coding and DES based dynamic encryption scheme for moving target defense
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2832854
– volume: 52
  start-page: 4413
  issue: 10
  year: 2006
  ident: 10.1016/j.comnet.2019.106886_bib0018
  article-title: A random linear network coding approach to multicast
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.2006.881746
SSID ssj0004428
Score 2.321185
Snippet Multi-homing is a new mechanism that enables hosts with multiple network interfaces (IP addresses), to connect to more than one data link. This technology...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 106886
SubjectTerms Algorithms
Coding
Communications systems
Computer mediated communication
Confidentiality
Cryptography
Data
Data compression
Data encryption
Encoding
Encryption
Homing
Interfaces
Internet
IP (Internet Protocol)
Lightweight encryption-authentication scheme
Matrices
Multicasting
Networks
Permutations
Physical characteristics
Physical properties
Random linear network coding
Reliability
Secure multi-homed networks
Security
Telecommunications
Wireless communication systems
Title Design and realization of efficient & secure multi-homed systems based on random linear network coding
URI https://dx.doi.org/10.1016/j.comnet.2019.106886
https://www.proquest.com/docview/2322649037
Volume 163
WOSCitedRecordID wos000492797800011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-7069
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0004428
  issn: 1389-1286
  databaseCode: AIEXJ
  dateStart: 19990114
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWLQc4IJ5qoSAfEJcoVWJn4_i4gqKCYIVQkfYWZf1QW-0m1e5S9TfxKxl7nEfLo_TAJVpFtuXsfJkZT2a-IeS140-xiYX322RJnOVGxQUvsthUVS4ZU7ldeJ7ZT2I2K-Zz-WU0-tHWwlwsRV0Xl5fy_L-KGu6BsF3p7C3E3S0KN-A3CB2uIHa4_pPg3_mcDMwbBy8w1Fk6p9B4ugjkGM2jjYu0G8wojE9cEX6gdd5EzrRp9xkBDJluVpFzRat1VGPKeKSazuC1HAehN0Q7xIdypytHwqAD4vrC4hCFkHIQhZjBk3k39giceVA5s4MOCWaJnbW_mhBl9vHzJZZ1f25OqtWq0n2WgmMex8qd02FEI5W-tE8OlDA4UTHYzfyKlg56EPVs6nrl5L81ARiNOHMShGd2yXvyoB9-lXH7miXs8hPb1LezElcp3SolrnKH7DAxkcWY7Ew_HM4_9lW4me_k2-2-LdT02YS_7uZPjtA1l8D7OccPyYNwQKFTBNYjMjL1Y3J_QFv5hFiEGAVh0gHEaGNpBzH6hiLA6ABgNACMeoBRmIIAowgwGtBDEWBPybf3h8dvj-LQryNWnGfbeCLcN1lTLBYTUWVMpawSxmqWFZpzawttheaJZJWR4JVbqbnmC6sTZkWWmHzCn5Fx3dRml1AulEiNcM0LTAaLSFAdTMNZuLKpYULtEd7-eaUKZPaup8qy_Jvo9kjczTpHMpcbxotWLmVwSNHRLAFsN8zcb8VYBt2wKeHwAscPmXDx_JYbeUHu9S_KPhlv19_NS3JXXWxPN-tXAYg_Ac4luPA
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Design+and+realization+of+efficient+%26+secure+multi-homed+systems+based+on+random+linear+network+coding&rft.jtitle=Computer+networks+%28Amsterdam%2C+Netherlands+%3A+1999%29&rft.au=Noura%2C+Hassan+N.&rft.au=Melki%2C+Reem&rft.au=Malli%2C+Mohammad&rft.au=Chehab%2C+Ali&rft.date=2019-11-09&rft.issn=1389-1286&rft.volume=163&rft.spage=106886&rft_id=info:doi/10.1016%2Fj.comnet.2019.106886&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_comnet_2019_106886
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1389-1286&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1389-1286&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1389-1286&client=summon