{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:55Z","timestamp":1740099295786,"version":"3.37.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051945"},{"type":"electronic","value":"9783030051952"}],"license":[{"start":{"date-parts":[[2018,12,30]],"date-time":"2018-12-30T00:00:00Z","timestamp":1546128000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-05195-2_33","type":"book-chapter","created":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T16:53:53Z","timestamp":1546102433000},"page":"337-346","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security Threats in Network Coding-Enabled Mobile Small Cells"],"prefix":"10.1007","author":[{"given":"Reza","family":"Parsamehr","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Mantas","sequence":"additional","affiliation":[]},{"given":"Ayman","family":"Radwan","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9-Fern\u00e1n","family":"Mart\u00ednez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,30]]},"reference":[{"issue":"2","key":"33_CR1","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2014.6736752","volume":"52","author":"C-X Wang","year":"2014","unstructured":"Wang, C.-X., et al.: Cellular architecture and key technologies for 5G wireless communication networks. IEEE Commun. Mag. 52(2), 122\u2013130 (2014)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"33_CR2","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCOM.2014.6736745","volume":"52","author":"I Chih-Lin","year":"2014","unstructured":"Chih-Lin, I., et al.: Toward green and soft: a 5G perspective. IEEE Commun. Mag. 52(2), 66\u201373 (2014)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"33_CR3","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCOM.2014.6736748","volume":"52","author":"B Bangerter","year":"2014","unstructured":"Bangerter, B., et al.: Networks and devices for the 5G era. IEEE Commun. Mag. 52(2), 90\u201396 (2014)","journal-title":"IEEE Commun. Mag."},{"key":"33_CR4","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1002\/9781119170402.ch9","volume-title":"Backhauling\/Fronthauling for Future Wireless Systems","author":"Victor Sucasas","year":"2016","unstructured":"Sucasas, V., Mantas, G., Rodriguez, J.: Security challenges for cloud radio access networks. In: Backhauling\/Fronthauling for Future Wireless Systems, pp. 195\u2013211 (2016)"},{"key":"33_CR5","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1002\/9781118867464.ch9","volume-title":"Fundamentals of 5G Mobile Networks","author":"Georgios Mantas","year":"2015","unstructured":"Mantas, G., et al.: Security for 5G Communications (2015)"},{"key":"33_CR6","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/ACCESS.2015.2461602","volume":"3","author":"A Gupta","year":"2015","unstructured":"Gupta, A., Jha, R.K.: A survey of 5G network: architecture and emerging technologies. IEEE Access 3, 1206\u20131232 (2015)","journal-title":"IEEE Access"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Chou, S.-F., et al.: Mobile small cell deployment for next generation cellular networks. In: Global Communications Conference (GLOBECOM), 2014 IEEE. IEEE (2014)","DOI":"10.1109\/GLOCOM.2014.7037574"},{"key":"33_CR8","first-page":"1","volume-title":"Fundamentals of 5G Mobile Networks","author":"Firooz B. Saghezchi","year":"2015","unstructured":"Saghezchi, F.B., et al.: Drivers for 5G. Fundamentals of 5G Mobile Networks, pp. 1\u201327 (2015)"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Katti, S., et al.: XORs in the air: practical wireless network coding. In: ACM SIGCOMM Computer Communication Review. ACM (2006)","DOI":"10.1145\/1159913.1159942"},{"issue":"4","key":"33_CR10","doi-asserted-by":"publisher","first-page":"3683","DOI":"10.1109\/JSYST.2018.2802493","volume":"12","author":"Y-J Chen","year":"2018","unstructured":"Chen, Y.-J., et al.: Topology-aware network coding for wireless multicast. IEEE Syst. J. 12(4), 3683\u20133692 (2018)","journal-title":"IEEE Syst. J."},{"issue":"4","key":"33_CR11","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede, R., et al.: Network information flow. IEEE Trans. Inf. Theor. 46(4), 1204\u20131216 (2000)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"33_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511754623","volume-title":"Network Coding: An Introduction","author":"T Ho","year":"2008","unstructured":"Ho, T., Lun, D.: Network Coding: An Introduction. Cambridge University Press, New York (2008)"},{"issue":"11","key":"33_CR13","doi-asserted-by":"publisher","first-page":"1906","DOI":"10.1109\/TCOMM.2005.857148","volume":"53","author":"Y Wu","year":"2005","unstructured":"Wu, Y., Chou, P.A., Kung, S.-Y.: Minimum-energy multicast in mobile ad hoc networks using network coding. IEEE Trans. Commun. 53(11), 1906\u20131918 (2005)","journal-title":"IEEE Trans. Commun."},{"key":"33_CR14","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1201\/b19290-23","volume-title":"Cyber-Physical Systems","author":"Alireza Esfahani","year":"2015","unstructured":"Esfahani, A., et al.: Towards secure network coding-enabled wireless sensor networks in cyber-physical systems. In: Cyber-Physical Systems from Theory to Practice, ch. 16, pp. 395\u2013415 (2015)"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Esfahani, A., et al.: A null space-based MAC scheme against pollution attacks to Random linear Network Coding. In: 2015 IEEE International Conference on Communication Workshop (ICCW). IEEE (2015)","DOI":"10.1109\/ICCW.2015.7247395"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Esfahani, A., et al.: An improved homomorphic message authentication code scheme for RLNC-enabled wireless networks. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE (2014)","DOI":"10.1109\/CAMAD.2014.7033210"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Esfahani, A., et al.: Analysis of a homomorphic MAC-based scheme against tag pollution in RLNC-enabled wireless networks. In: 2015 IEEE 20th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD). IEEE (2015)","DOI":"10.1109\/CAMAD.2015.7390500"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Yang, D., et al.: Jointly padding for subspace orthogonality against tag pollution. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE (2014)","DOI":"10.1109\/CAMAD.2014.7033211"},{"issue":"7","key":"33_CR19","doi-asserted-by":"publisher","first-page":"510251","DOI":"10.1155\/2015\/510251","volume":"11","author":"A Esfahani","year":"2015","unstructured":"Esfahani, A., et al.: Dual-homomorphic message authentication code scheme for network coding-enabled wireless sensor networks. Int. J. Distrib. Sens. Netw. 11(7), 510251 (2015)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"6","key":"33_CR20","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/s10207-016-0351-z","volume":"16","author":"A Esfahani","year":"2017","unstructured":"Esfahani, A., et al.: An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks. Int. J. Inf. Secur. 16(6), 627\u2013639 (2017)","journal-title":"Int. J. Inf. Secur."},{"issue":"5","key":"33_CR21","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/LCOMM.2016.2547420","volume":"20","author":"A Esfahani","year":"2016","unstructured":"Esfahani, A., Mantas, G., Rodriguez, J.: An efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC. IEEE Commun. Lett. 20(5), 918\u2013921 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"1","key":"33_CR22","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1186\/s13638-016-0601-9","volume":"2016","author":"A Esfahani","year":"2016","unstructured":"Esfahani, A., et al.: An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems. EURASIP J. Wirel. Commun. Netw. 2016(1), 113 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"33_CR23","unstructured":"SEcure Network Coding for Reduced Energy nexT generation Mobile Small cells. H2020-MSCA-ITN-2016-722424 01 January 2017\u201331 December 2020. http:\/\/h2020-secret.eu\/index.html"},{"key":"33_CR24","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1016\/j.comnet.2015.03.010","volume":"83","author":"VN Talooki","year":"2015","unstructured":"Talooki, V.N., et al.: Security concerns and countermeasures in network coding based communication systems: a survey. Comput. Netw. 83, 422\u2013445 (2015)","journal-title":"Comput. Netw."},{"key":"33_CR25","doi-asserted-by":"crossref","unstructured":"Ostovari, P., Wu, J.: Towards Network Coding for Cyber-Physical Systems: Security Challenges and Applications. Wiley (2017)","DOI":"10.1002\/9781119226079.ch11"},{"key":"33_CR26","unstructured":"Lima, L., et al.: Network coding security: Attacks and countermeasures. arXiv preprint arXiv:0809.1366 (2008)"},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Fan, Y., et al.: An efficient privacy-preserving scheme against traffic analysis attacks in network coding. In: INFOCOM 2009 IEEE. IEEE (2009)","DOI":"10.1109\/INFCOM.2009.5062146"},{"key":"33_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-33112-6_5","volume-title":"Wireless Network Security. Signals and Communication Technology","author":"B Wu","year":"2007","unstructured":"Wu, B., Chen, J., Wu, J., Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Xiao, Y., Shen, X.S., Du, D.Z. (eds.) Wireless Network Security. Signals and Communication Technology. Springer, Boston (2007). https:\/\/doi.org\/10.1007\/978-0-387-33112-6_5"},{"issue":"9","key":"33_CR29","first-page":"4063","volume":"2","author":"PM Jawandhiya","year":"2010","unstructured":"Jawandhiya, P.M., et al.: A survey of mobile ad hoc network attacks. Int. J. Eng. Sci. Technol. 2(9), 4063\u20134071 (2010)","journal-title":"Int. J. Eng. Sci. Technol."},{"issue":"5","key":"33_CR30","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/TDSC.2012.39","volume":"9","author":"J Dong","year":"2012","unstructured":"Dong, J., et al.: Pollution attacks and defenses in wireless interflow network coding systems. IEEE Trans. Depend. Secure Comput. 9(5), 741\u2013755 (2012)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"33_CR31","doi-asserted-by":"crossref","unstructured":"Newell, A.J., Curtmola, R., Nita-Rotaru, C.: Entropy attacks and countermeasures in wireless network coding. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM (2012)","DOI":"10.1145\/2185448.2185473"},{"key":"33_CR32","doi-asserted-by":"crossref","unstructured":"Chen, B., et al.: Remote data checking for network coding-based distributed storage systems. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop. ACM (2010)","DOI":"10.1145\/1866835.1866842"},{"key":"33_CR33","unstructured":"Chiu, H.S., Lui, K.-S.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 2006 1st International Symposium on Wireless Pervasive Computing. IEEE (2006)"},{"key":"33_CR34","volume-title":"Electrical Engineering Handbook","author":"Amitabh Mishra","year":"2002","unstructured":"Mishra, A., Nadkarni, K.M.: Security in wireless ad hoc networks. In: The Handbook of Ad Hoc Wireless Networks. CRC Press, Inc (2003)"},{"key":"33_CR35","unstructured":"Padmavathi, D.G., Shanmugapriya, M.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 (2009)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Broadband Communications, Networks, and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05195-2_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T08:00:45Z","timestamp":1662710445000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05195-2_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,30]]},"ISBN":["9783030051945","9783030051952"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05195-2_33","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018,12,30]]},"assertion":[{"value":"BROADNETS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband Communications, Networks and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"broadnets2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/broadnets.org\/2018\/show\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}