{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:00:17Z","timestamp":1769914817905,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T00:00:00Z","timestamp":1635897600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T00:00:00Z","timestamp":1635897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Sichuan Science and Technology Program","award":["2021YFG0157"],"award-info":[{"award-number":["2021YFG0157"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11235-021-00842-6","type":"journal-article","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T07:03:44Z","timestamp":1635923024000},"page":"47-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A computationally efficient HMAC-based authentication scheme for network coding"],"prefix":"10.1007","volume":"79","author":[{"given":"Tandoh","family":"Lawrence","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-1265","authenticated-orcid":false,"given":"Fagen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ikram","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Charles R.","family":"Haruna","sequence":"additional","affiliation":[]},{"given":"Michael Y.","family":"Kpiebaareh","sequence":"additional","affiliation":[]},{"given":"Tandoh","family":"Christopher","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,3]]},"reference":[{"issue":"4","key":"842_CR1","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede, R., Ning, C., Li, S. R., & Yeung, R. W. (2000). Network information flow. IEEE Transactions on Information Theory, 46(4), 1204\u20131216. https:\/\/doi.org\/10.1109\/18.850663","journal-title":"IEEE Transactions on Information Theory"},{"key":"842_CR2","doi-asserted-by":"crossref","unstructured":"Bollob\u00e1s, B. (1998). Random graphs, pp. 215\u2013252. Springer","DOI":"10.1007\/978-1-4612-0619-4_7"},{"key":"842_CR3","doi-asserted-by":"crossref","unstructured":"Gkantsidis, C., & Rodriguez, P. R. (2005). Network coding for large scale content distribution. In: Proceedings IEEE 24th annual joint conference of the IEEE computer and communications societies, Vol.\u00a04, pp. 2235\u20132245. IEEE","DOI":"10.1109\/INFCOM.2005.1498511"},{"issue":"6","key":"842_CR4","doi-asserted-by":"publisher","first-page":"1956","DOI":"10.1016\/j.jnca.2011.07.012","volume":"34","author":"MA Iqbal","year":"2011","unstructured":"Iqbal, M. A., Dai, B., Huang, B., Hassan, A., & Yu, S. (2011). Survey of network coding-aware routing protocols in wireless networks. Journal of Network and Computer Applications, 34(6), 1956\u20131970.","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"842_CR5","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/1282427.1282400","volume":"37","author":"S Chachulski","year":"2007","unstructured":"Chachulski, S., Jennings, M., Katti, S., & Katabi, D. (2007). Trading structure for randomness in wireless opportunistic routing. SIGCOMM Computer Communication Review, 37(4), 169\u2013180. https:\/\/doi.org\/10.1145\/1282427.1282400","journal-title":"SIGCOMM Computer Communication Review"},{"key":"842_CR6","unstructured":"Gkantsidis, C., & Goldberg, M. (2005). Avalanche: File swarming with network coding. Microsoft Research"},{"key":"842_CR7","doi-asserted-by":"crossref","unstructured":"Dimakis, A. G., Prabhakaran V., & Ramchandran, K. (2005). Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes. In: IPSN 2005. Fourth international symposium on information processing in sensor networks, pp. 111\u2013117. IEEE","DOI":"10.1109\/IPSN.2005.1440909"},{"issue":"7","key":"842_CR8","doi-asserted-by":"publisher","first-page":"510251","DOI":"10.1155\/2015\/510251","volume":"11","author":"A Esfahani","year":"2015","unstructured":"Esfahani, A., Yang, D., Mantas, G., Nascimento, A., & Rodriguez, J. (2015). Dual-homomorphic message authentication code scheme for network coding-enabled wireless sensor networks. International Journal of Distributed Sensor Networks, 11(7), 510251.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"6","key":"842_CR9","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/s10207-016-0351-z","volume":"16","author":"A Esfahani","year":"2017","unstructured":"Esfahani, A., Mantas, G., Rodriguez, J., & Neves, J. C. (2017). An efficient homomorphic mac-based scheme against data and tag pollution attacks in network coding-enabled wireless networks. International Journal of Information Security, 16(6), 627\u2013639.","journal-title":"International Journal of Information Security"},{"key":"842_CR10","doi-asserted-by":"crossref","unstructured":"Katti, S., Katabi, D., Hu, W., Rahul, H., & Medard, M. (2006). The importance of being opportunistic: practical network coding for wireless environments. Newsletter ACM SIGCOMM Computer Communication Review 36(4)","DOI":"10.1145\/1151659.1159942"},{"key":"842_CR11","unstructured":"Wu, Y., Chou, P. A. & Kung, S. Y. (2005). Information exchange in wireless networks with network coding and physical-layer broadcast. Report, MSR-TR-2004"},{"key":"842_CR12","unstructured":"Widmer, J., Fragouli, C., Le\u00a0Boudec, J. Y. (2005). Low-complexity energy-efficient broadcasting in wireless ad-hoc networks using network coding."},{"key":"842_CR13","doi-asserted-by":"crossref","unstructured":"Adat, V., Politis, I., Tselios, C., Galiotos, P., & Kotsopoulos, S. (2018). On blockchain enhanced secure network coding for 5g deployments. In: 2018 IEEE global communications conference (GLOBECOM), pp. 1\u20137. IEEE","DOI":"10.1109\/GLOCOM.2018.8647581"},{"issue":"10","key":"842_CR14","doi-asserted-by":"publisher","first-page":"4413","DOI":"10.1109\/TIT.2006.881746","volume":"52","author":"T Ho","year":"2006","unstructured":"Ho, T., Medard, M., Koetter, R., Karger, D. R., Effros, M., Shi, J., & Leong, B. (2006). A random linear network coding approach to multicast. IEEE Transactions on Information Theory, 52(10), 4413\u20134430. https:\/\/doi.org\/10.1109\/TIT.2006.881746","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"842_CR15","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1109\/JSAC.2010.100607","volume":"28","author":"M Kim","year":"2010","unstructured":"Kim, M., Lima, L., Zhao, F., Barros, J., M\u00e9dard, M., Koetter, R., Kalker, T., & Han, K. J. (2010). On counteracting byzantine attacks in network coded peer-to-peer networks. IEEE Journal on Selected Areas in Communications, 28(5), 692\u2013702.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"842_CR16","doi-asserted-by":"crossref","unstructured":"Li, Y., Yao, H., Chen, M., Jaggi, S., & Rosen, A. (2010). Ripple authentication for network coding. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20139. IEEE","DOI":"10.1109\/INFCOM.2010.5462051"},{"issue":"6","key":"842_CR17","doi-asserted-by":"publisher","first-page":"2798","DOI":"10.1109\/TIT.2008.921894","volume":"54","author":"T Ho","year":"2008","unstructured":"Ho, T., Leong, B., Koetter, R., M\u00e9dard, M., Effros, M., & Karger, D. R. (2008). Byzantine modification detection in multicast networks with random network coding. IEEE Transactions on Information Theory, 54(6), 2798\u20132803.","journal-title":"IEEE Transactions on Information Theory"},{"key":"842_CR18","doi-asserted-by":"crossref","unstructured":"Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., & M\u00e9dard, M. (2007). Resilient network coding in the presence of byzantine adversaries. In: IEEE INFOCOM 2007-26th IEEE international conference on computer communications, pp. 616\u2013624. IEEE","DOI":"10.1109\/ISIT.2007.4557281"},{"key":"842_CR19","doi-asserted-by":"crossref","unstructured":"Gkantsidis, C., & Rodriguez, P. (2006). Cooperative security for network coding file distribution. In: INFOCOM, Vol.\u00a03.","DOI":"10.1109\/INFOCOM.2006.233"},{"key":"842_CR20","doi-asserted-by":"crossref","unstructured":"Yu, Z., Wei, Y., Ramkumar, B., & Guan, Y. (2009). An efficient scheme for securing XOR network coding against pollution attacks. In: IEEE INFOCOM 2009, pp. 406\u2013414. IEEE","DOI":"10.1109\/INFCOM.2009.5061945"},{"key":"842_CR21","doi-asserted-by":"crossref","unstructured":"Yu, Z., Wei, Y., Ramkumar, B., & Guan, Y. (2008). An efficient signature-based scheme for securing network coding against pollution attacks. In: IEEE INFOCOM 2008-The 27th conference on computer communications, pp. 1409\u20131417. IEEE","DOI":"10.1109\/INFOCOM.2008.199"},{"key":"842_CR22","doi-asserted-by":"crossref","unstructured":"Agrawal, S., & Boneh, D. (2009). Homomorphic macs: Mac-based integrity for network coding. In: International conference on applied cryptography and network security, pp. 292\u2013305. Springer","DOI":"10.1007\/978-3-642-01957-9_18"},{"key":"842_CR23","doi-asserted-by":"crossref","unstructured":"Kehdi, E., & Li, B. (2009). Null keys: Limiting malicious attacks via null space properties of network coding. In: IEEE INFOCOM 2009, pp. 1224\u20131232. IEEE","DOI":"10.1109\/INFCOM.2009.5062036"},{"key":"842_CR24","doi-asserted-by":"crossref","unstructured":"Krohn, M. N., Freedman, M. J., & Mazieres, D. (2004). On-the-fly verification of rateless erasure codes for efficient content distribution. In: IEEE proceedings of symposium on security and privacy, 2004. pp. 226\u2013240. IEEE","DOI":"10.1109\/SECPRI.2004.1301326"},{"key":"842_CR25","doi-asserted-by":"crossref","unstructured":"Dai, B., Zhang, S., Qu, Y., Yang, J., & Wang, F. (2010). Orthogonal vector based network coding against pollution attacks in n-layer combination networks. In: 2010 5th international ICST conference on communications and networking in China, pp. 1\u20135. IEEE","DOI":"10.4108\/chinacom.2010.89"},{"key":"842_CR26","doi-asserted-by":"crossref","unstructured":"Zhao, F., Kalker, T., M\u00e9dard, M., & Han, K. J. (2007). Signatures for content distribution with network coding. In: 2007 IEEE international symposium on information theory, pp. 556\u2013560. IEEE","DOI":"10.1109\/ISIT.2007.4557283"},{"issue":"1","key":"842_CR27","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1504\/IJICOT.2009.024044","volume":"1","author":"D Charles","year":"2009","unstructured":"Charles, D., Jain, K., & Lauter, K. (2009). Signatures for network coding. International Journal of Information and Coding Theory, 1(1), 3\u201314.","journal-title":"International Journal of Information and Coding Theory"},{"issue":"6","key":"842_CR28","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1109\/TCSS.2019.2949153","volume":"6","author":"R Parsamehr","year":"2019","unstructured":"Parsamehr, R., Esfahani, A., Mantas, G., Radwan, A., Mumtaz, S., Rodriguez, J., & Mart\u00ednez-Ortega, J. F. (2019). A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells. IEEE Transactions on Computational Social Systems, 6(6), 1467\u20131477.","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"842_CR29","doi-asserted-by":"crossref","unstructured":"Parsamehr, R., Esfahani, A., Mantas, G., Rodriguez, J., & Mart\u00ednez-Ortega, J. F. (2019). A location-aware idps scheme for network coding-enabled mobile small cells. In: 2019 IEEE 2nd 5G World Forum (5GWF), pp. 91\u201396. IEEE","DOI":"10.1109\/5GWF.2019.8911650"},{"key":"842_CR30","doi-asserted-by":"publisher","first-page":"43863","DOI":"10.1109\/ACCESS.2020.2977428","volume":"8","author":"R Parsamehr","year":"2020","unstructured":"Parsamehr, R., Mantas, G., Rodriguez, J., & Martinez-Ortega, J. F. (2020). Idlp: An efficient intrusion detection and location-aware prevention mechanism for network coding-enabled mobile small cells. IEEE Access, 8, 43863\u201343875.","journal-title":"IEEE Access"},{"key":"842_CR31","doi-asserted-by":"crossref","unstructured":"Adat, V., Parsamehr, R., Politis, I., Tselios, C., & Kotsopoulos, S. (2020). Malicious user identification scheme for network coding enabled small cell environment. In: ICC 2020-2020 IEEE international conference on communications (ICC), pp. 1\u20136. IEEE","DOI":"10.1109\/ICC40277.2020.9148736"},{"key":"842_CR32","doi-asserted-by":"crossref","unstructured":"Adat, V., Politis, I., Tselios, C., Kotsopoulos, S. (2018). Secure network coding for sdn-based mobile small cells. In: International conference on broadband communications, networks and systems, pp. 347\u2013356. Springer","DOI":"10.1007\/978-3-030-05195-2_34"},{"key":"842_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, P., Jiang, Y., Lin, C., Yao, H., Wasef, A., & Shenz, X. (2011). Padding for orthogonality: Efficient subspace authentication for network coding. In: 2011 Proceedings IEEE INFOCOM, pp. 1026\u20131034. IEEE","DOI":"10.1109\/INFCOM.2011.5934876"},{"key":"842_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, P., Jiang, Y., Lin, C., Fan, Y., & Shen, X. (2010). P-coding: Secure network coding against eavesdropping attacks. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20139. IEEE","DOI":"10.1109\/INFCOM.2010.5462050"},{"key":"842_CR35","unstructured":"Cai, N., & Yeung, R. W. (2002). Secure network coding. In: Proceedings IEEE international symposium on information theory, p. 323. IEEE"},{"key":"842_CR36","doi-asserted-by":"crossref","unstructured":"Boneh, D., Freeman, D., Katz, J., & Waters, B. (2009). Signing a linear subspace: Signature schemes for network coding. In: International workshop on public key cryptography, pp. 68\u201387. Springer","DOI":"10.1007\/978-3-642-00468-1_5"},{"key":"842_CR37","unstructured":"Cover, T. M., & Thomas, J. A. (2006). Elements of information theory (wiley series in telecommunications and signal processing)"},{"key":"842_CR38","doi-asserted-by":"publisher","first-page":"399","DOI":"10.4153\/CJM-1956-045-5","volume":"8","author":"L Ford","year":"1956","unstructured":"Ford, L., & Fulkerson, D. (1956). Maximal flow through a network. Canadian Journal of Mathematics, 8, 399\u2013404.","journal-title":"Canadian Journal of Mathematics"},{"issue":"4","key":"842_CR39","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/TIT.1956.1056816","volume":"2","author":"P Elias","year":"1956","unstructured":"Elias, P., Feinstein, A., & Shannon, C. (1956). A note on the maximum flow through a network. IRE Transactions on Information Theory, 2(4), 117\u2013119.","journal-title":"IRE Transactions on Information Theory"},{"issue":"1","key":"842_CR40","doi-asserted-by":"publisher","first-page":"96","DOI":"10.4064\/fm-10-1-96-115","volume":"10","author":"K Menger","year":"1927","unstructured":"Menger, K. (1927). Zur allgemeinen kurventheorie. Fundamenta Mathematicae, 10(1), 96\u2013115.","journal-title":"Fundamenta Mathematicae"},{"key":"842_CR41","unstructured":"Chou, P. A., Wu, Y., & Jain, K. (1998). Practical network coding. In: Proceedings of the annual Allerton conference on communication control and computing, vol.\u00a041, pp. 40\u201349. The University; 1998"},{"key":"842_CR42","unstructured":"Medard, M., & Sprintson, A. (2012). Network coding: Fundamentals and applications. Academic Press"},{"issue":"6","key":"842_CR43","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1109\/TIT.2005.847712","volume":"51","author":"S Jaggi","year":"2005","unstructured":"Jaggi, S., Sanders, P., Chou, P. A., Effros, M., Egner, S., Jain, K., & Tolhuizen, L. M. (2005). Polynomial time algorithms for multicast network code construction. IEEE Transactions on Information Theory, 51(6), 1973\u20131982.","journal-title":"IEEE Transactions on Information Theory"},{"key":"842_CR44","doi-asserted-by":"crossref","unstructured":"Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., & Pinkas, B. (1999). Multicast security: A taxonomy and some efficient constructions. In: IEEE INFOCOM\u201999 conference on computer communications. Eighteenth annual joint conference of the IEEE computer and communications societies. The future is now (Cat. No. 99CH36320), Vol.\u00a02, pp. 708\u2013716. IEEE","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"842_CR45","doi-asserted-by":"crossref","unstructured":"Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press","DOI":"10.1201\/b17668"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-021-00842-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-021-00842-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-021-00842-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T07:35:09Z","timestamp":1643441709000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-021-00842-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,3]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["842"],"URL":"https:\/\/doi.org\/10.1007\/s11235-021-00842-6","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,3]]},"assertion":[{"value":"29 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}