{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:56:36Z","timestamp":1769914596285,"version":"3.49.0"},"reference-count":25,"publisher":"SAGE Publications","issue":"7","license":[{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["PTDC\/EEA-TEL\/119228\/2010"],"award-info":[{"award-number":["PTDC\/EEA-TEL\/119228\/2010"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["285969"],"award-info":[{"award-number":["285969"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["PTDC\/EEA-TEL\/119228\/2010"],"award-info":[{"award-number":["PTDC\/EEA-TEL\/119228\/2010"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["285969"],"award-info":[{"award-number":["285969"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,7,1]]},"abstract":"<jats:p> Network coding has shown a considerable improvement in terms of capacity and robustness compared to traditional store-and-forward transmission paradigm. However, since the intermediate nodes in network coding-enabled networks have the ability to change the packets en route, network coding-enabled networks are vulnerable to pollution attacks where a small number of polluted messages can corrupt bunches of legitimate messages. Recently, research effort has been put on schemes for protecting the transmitted messages against data pollution attacks. However, most of them cannot resist tag pollution attacks. This paper presents a new homomorphic MAC-based scheme, called Dual-Homomorphic MAC (Dual-HMAC), for network coding-enabled wireless sensor networks. The proposed scheme makes use of two types of tags (i.e., MACs and D-MACs) to provide resistance against data pollution attacks and partially tag pollution attacks. Furthermore, our proposed scheme presents low communication overhead and low computational complexity compared to other existing schemes. <\/jats:p>","DOI":"10.1155\/2015\/510251","type":"journal-article","created":{"date-parts":[[2015,7,2]],"date-time":"2015-07-02T21:01:29Z","timestamp":1435870889000},"page":"510251","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":27,"title":["Dual-Homomorphic Message Authentication Code Scheme for Network Coding-Enabled Wireless Sensor Networks"],"prefix":"10.1177","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2100-1569","authenticated-orcid":false,"given":"Alireza","family":"Esfahani","sequence":"first","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es (IT), Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1780-0234","authenticated-orcid":false,"given":"Du","family":"Yang","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es (IT), Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8074-0417","authenticated-orcid":false,"given":"Georgios","family":"Mantas","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es (IT), Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"}]},{"given":"Alberto","family":"Nascimento","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es (IT), Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9829-0955","authenticated-orcid":false,"given":"Jonathan","family":"Rodriguez","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es (IT), Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"},{"name":"Universidade de Aveiro, Campus Universit\u00e1rio de Santiago, 3810-193 Aveiro, Portugal"}]}],"member":"179","published-online":{"date-parts":[[2015,7,2]]},"reference":[{"issue":"2","key":"B1-2015-510251","first-page":"59","volume":"1","author":"Sen J.","year":"2009","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"B2-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"B3-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2005.857148"},{"key":"B4-2015-510251","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282400"},{"key":"B5-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2006.874396"},{"key":"B6-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2005.1498511"},{"key":"B7-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2006.881746"},{"key":"B8-2015-510251","first-page":"226","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Krohn M. N."},{"key":"B9-2015-510251","first-page":"1026","volume-title":"Proceedings of the IEEE INFOCOM","author":"Peng Z."},{"key":"B10-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2008.921894"},{"key":"B11-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2008.921711"},{"key":"B12-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2013.sup.0513026"},{"key":"B13-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2009.5061945"},{"key":"B14-2015-510251","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_18"},{"key":"B15-2015-510251","volume-title":"Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography (PKC \u203209)","author":"Boneh D."},{"key":"B16-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2006.233"},{"key":"B17-2015-510251","doi-asserted-by":"publisher","DOI":"10.1504\/ijicot.2009.024044"},{"key":"B18-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2007.199"},{"key":"B19-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062036"},{"key":"B20-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2010.5462051"},{"key":"B21-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"B22-2015-510251","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"B23-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2013.24"},{"key":"B24-2015-510251","volume-title":"Proceedings of the 41st Annual Allerton Conference on Communication, Control, and Computing","author":"Chou P."},{"key":"B25-2015-510251","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.751457"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/510251","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/510251","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/510251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,9]],"date-time":"2021-05-09T06:18:56Z","timestamp":1620541136000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/510251"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,1]]},"references-count":25,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2015,7,1]]}},"alternative-id":["10.1155\/2015\/510251"],"URL":"https:\/\/doi.org\/10.1155\/2015\/510251","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,1]]}}}