{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T09:26:36Z","timestamp":1706779596425},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T00:00:00Z","timestamp":1461283200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"European Community","award":["285969"],"award-info":[{"award-number":["285969"]}]},{"name":"FCT","award":["SFRH\/BD\/102029\/2014"],"award-info":[{"award-number":["SFRH\/BD\/102029\/2014"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0601-9","type":"journal-article","created":{"date-parts":[[2016,4,21]],"date-time":"2016-04-21T23:45:27Z","timestamp":1461282327000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems"],"prefix":"10.1186","volume":"2016","author":[{"given":"Alireza","family":"Esfahani","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Mantas","sequence":"additional","affiliation":[]},{"given":"H\u00e9lio","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Rodriguez","sequence":"additional","affiliation":[]},{"given":"Jose Carlos","family":"Neves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,22]]},"reference":[{"issue":"8","key":"601_CR1","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOM.2014.6871673","volume":"52","author":"A Solanas","year":"2014","unstructured":"A Solanas, C Patsakis, M Conti, I Vlachos, V Ramos, F Falcone, O Postolache, P Perez-martinez, R Pietro, D Perrea, et al., Smart health: a context-aware health paradigm within smart cities. Commun. Mag. IEEE. 52(8), 74\u201381 (2014).","journal-title":"Commun. Mag. IEEE"},{"issue":"1","key":"601_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TITB.2012.2183269","volume":"16","author":"RS Istepanaian","year":"2012","unstructured":"RS Istepanaian, Y-T Zhang, Guest editorial introduction to the special section: 4g health\u2014the long-term evolution of m-health. Inf. Technol. Biomed. IEEE Trans.16(1), 1\u20135 (2012).","journal-title":"Inf. Technol. Biomed. IEEE Trans."},{"issue":"3","key":"601_CR3","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/SURV.2013.121313.00064","volume":"16","author":"S Movassaghi","year":"2014","unstructured":"S Movassaghi, M Abolhasan, J Lipman, D Smith, A Jamalipour, Wireless body area networks: a survey. Commun. Surv. Tutorials IEEE. 16(3), 1658\u20131686 (2014).","journal-title":"Commun. Surv. Tutorials IEEE"},{"issue":"1","key":"601_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/TITB.2012.2224876","volume":"17","author":"M Fengou","year":"2013","unstructured":"M Fengou, G Mantas, D Lymberopoulos, N Komninos, S Fengos, N Lazarou, A new framework architecture for next generation e-health services. Biomed. Health Inf. IEEE J.17(1), 9\u201318 (2013).","journal-title":"Biomed. Health Inf. IEEE J."},{"issue":"1","key":"601_CR5","first-page":"3","volume":"16","author":"U Varshney","year":"2005","unstructured":"U Varshney, Pervasive healthcare: applications, challenges and wireless solutions. Commun. Assoc. Inf. Syst.16(1), 3 (2005).","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"601_CR6","unstructured":"G Mantas, D Lymberopoulos, N Komninos, in Engineering in Medicine and Biology Society, 2009. EMBC 2009. Annual International Conference of the IEEE, Minneapolis, Minnesota, USA. Integrity mechanism for ehealth tele-monitoring system in smart home environment (2009), pp. 3509\u20133512."},{"issue":"1","key":"601_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11276-010-0252-4","volume":"17","author":"B Latr\u00e9","year":"2011","unstructured":"B Latr\u00e9, B Braem, I Moerman, C Blondia, P Demeester, A survey on wireless body area networks. Wireless Netw.17(1), 1\u201318 (2011).","journal-title":"Wireless Netw."},{"issue":"3","key":"601_CR8","doi-asserted-by":"publisher","first-page":"4806","DOI":"10.3390\/s140304806","volume":"14","author":"E Kartsakli","year":"2014","unstructured":"E Kartsakli, A Antonopoulos, L Alonso, C Verikoukis, A cloud-assisted random linear network coding medium access control protocol for healthcare applications. Sensors. 14(3), 4806\u20134830 (2014).","journal-title":"Sensors"},{"issue":"10","key":"601_CR9","doi-asserted-by":"publisher","first-page":"18009","DOI":"10.3390\/s141018009","volume":"14","author":"E Kartsakli","year":"2014","unstructured":"E Kartsakli, AS Lalos, A Antonopoulos, S Tennina, MD Renzo, L Alonso, C Verikoukis, A survey on M2M systems for mHealth: a wireless communications perspective. Sensors. 14(10), 18009\u201318052 (2014).","journal-title":"Sensors"},{"issue":"2","key":"601_CR10","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11036-010-0260-8","volume":"16","author":"M Chen","year":"2011","unstructured":"M Chen, S Gonzalez, A Vasilakos, H Cao, VC Leung, Body area networks: a survey. Mobile Netw. Appl.16(2), 171\u2013193 (2011).","journal-title":"Mobile Netw. Appl."},{"key":"601_CR11","first-page":"55","volume":"1","author":"J Sen","year":"2009","unstructured":"J Sen, A survey on wireless sensor network security. Int. J. Commun. Netw. Inf. Secur. 1:, 55\u201378 (2009).","journal-title":"Int. J. Commun. Netw. Inf. Secur"},{"issue":"5","key":"601_CR12","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MCOM.2012.6194389","volume":"50","author":"A Boulis","year":"2012","unstructured":"A Boulis, D Smith, D Miniutti, L Libman, Y Tselishchev, Challenges in body area networks for healthcare: The mac. Commun. Mag. IEEE. 50(5), 100\u2013106 (2012).","journal-title":"Commun. Mag. IEEE"},{"issue":"1","key":"601_CR13","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MCOM.2015.7010519","volume":"53","author":"E Kartsakli","year":"2015","unstructured":"E Kartsakli, A Antonopoulos, A Lalos, S Tennina, M Renzo, L Alonso, C Verikoukis, Reliable mac design for ambient assisted living: Moving the coordination to the cloud. Commun. Mag. IEEE. 53(1), 78\u201386 (2015).","journal-title":"Commun. Mag. IEEE"},{"key":"601_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/503417","volume":"2014","author":"S Tennina","year":"2014","unstructured":"S Tennina, M Di Renzo, E Kartsakli, F Graziosi, A Lalos, A Antonopoulos, PV Mekikis, L Alonso, WSN4QoL: a WSN-oriented healthcare system architecture. Int. J. Distributed Sensor Netw.2014:, 1\u201316 (2014).","journal-title":"Int. J. Distributed Sensor Netw."},{"key":"601_CR15","unstructured":"S Movassaghi, M Shirvanimoghaddam, M Abolhasan, D Smith, in Local Computer Networks (LCN), 2013 IEEE 38th Conference On, Sydney, NSW. An energy efficient network coding approach for wireless body area networks (2013), pp. 468\u2013475."},{"key":"601_CR16","doi-asserted-by":"crossref","unstructured":"AS Lalos, E Kartsakli, A Antonopoulos, S Termina, M Di Renzo, L Alonso, C Verikoukis, in Global Communications Conference (GLOBECOM), 2014 IEEE. Cooperative compressed sensing schemes for telemonitoring of vital signals in wbans (IEEE, 2014), pp. 2387\u20132392.","DOI":"10.1109\/GLOCOM.2014.7037165"},{"key":"601_CR17","doi-asserted-by":"crossref","unstructured":"I-H Hou, Y-E Tsai, TF Abdelzaher, I Gupta, in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. Adapcode: Adaptive network coding for code updates in wireless sensor networks (IEEE, 2008).","DOI":"10.1109\/INFOCOM.2007.211"},{"key":"601_CR18","doi-asserted-by":"crossref","unstructured":"A Antonopoulos, C Verikoukis, Network-coding-based cooperative ARQ medium access control protocol for wireless sensor networks. Int. J. Distributed Sensor Netw.2012: (2011). Article ID 601321, 9 pages.","DOI":"10.1155\/2012\/601321"},{"issue":"4","key":"601_CR19","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"R Ahlswede, N Cai, S-Y Li, RW Yeung, Network information flow. Inf. Theory IEEE Trans.46(4), 1204\u20131216 (2000).","journal-title":"Inf. Theory IEEE Trans."},{"issue":"2","key":"601_CR20","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TIT.2002.807285","volume":"49","author":"S-YR Li","year":"2003","unstructured":"S-YR Li, RW Yeung, N Cai, Linear network coding. Inf. Theory IEEE Trans.49(2), 371\u2013381 (2003).","journal-title":"Inf. Theory IEEE Trans."},{"key":"601_CR21","unstructured":"T Ho, R Koetter, M Medard, DR Karger, M Effros, in Proc. IEEE Int. Symp. Information Theory, Yokohama, Japan, Jun.\/Jul. 2003. The benefits of coding over routing in a randomized setting (2003), p. 442."},{"issue":"10","key":"601_CR22","doi-asserted-by":"publisher","first-page":"4413","DOI":"10.1109\/TIT.2006.881746","volume":"52","author":"T Ho","year":"2006","unstructured":"T Ho, M M\u00e9dard, R Koetter, DR Karger, M Effros, J Shi, B Leong, A random linear network coding approach to multicast. Inf. Theory IEEE Trans.52(10), 4413\u20134430 (2006).","journal-title":"Inf. Theory IEEE Trans."},{"issue":"3","key":"601_CR23","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TNET.2008.923722","volume":"16","author":"S Katti","year":"2008","unstructured":"S Katti, H Rahul, W Hu, D Katabi, M M\u00e9dard, J Crowcroft, XORs in the air: practical wireless network coding. IEEE\/ACM Trans. Netw. (ToN). 16(3), 497\u2013510 (2008).","journal-title":"IEEE\/ACM Trans. Netw. (ToN)"},{"key":"601_CR24","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1109\/INFCOM.2009.5061945","volume-title":"INFOCOM 2009, IEEE","author":"Z Yu","year":"2009","unstructured":"Z Yu, Y Wei, B Ramkumar, Y Guan, in INFOCOM 2009, IEEE. An efficient scheme for securing XOR network coding against pollution attacks (IEEERio de Janeiro, 2009), pp. 406\u2013414."},{"key":"601_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/GLOCOM.2010.5683847","volume-title":"Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE","author":"W Cheng","year":"2010","unstructured":"W Cheng, L Yu, F Xiong, W Wang, in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE. Trusted network coding in wireless ad hoc networks (IEEEMiami, FL, 2010), pp. 1\u20135."},{"issue":"5","key":"601_CR26","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/TDSC.2012.39","volume":"9","author":"J Dong","year":"2012","unstructured":"J Dong, R Curtmola, C Nita-Rotaru, DK Yau, Pollution attacks and defenses in wireless interflow network coding systems. Dependable Secure Comput. IEEE Trans.9(5), 741\u2013755 (2012).","journal-title":"Dependable Secure Comput. IEEE Trans."},{"key":"601_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ISCC.2014.6912628","volume-title":"Computers and Communication (ISCC), 2014 IEEE Symposium On","author":"A Esfahani","year":"2014","unstructured":"A Esfahani, A Nascimento, J Rodriguez, JC Neves, in Computers and Communication (ISCC), 2014 IEEE Symposium On. An efficient MAC-signature scheme for authentication in XOR network coding (IEEEFunchal, Madeira, 2014), pp. 1\u20135."},{"key":"601_CR28","unstructured":"MN Krohn, MJ Freedman, D Mazieres, in Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium On. On-the-fly verification of rateless erasure codes for efficient content distribution (IEEE, 2004), pp. 226\u2013240."},{"issue":"9","key":"601_CR29","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/JSAC.2013.SUP.0513026","volume":"31","author":"C Cheng","year":"2013","unstructured":"C Cheng, T Jiang, Q Zhang, TESLA-based homomorphic MAC for authentication in p2p system for live streaming with network coding. Selected Areas Commun. IEEE J.31(9), 291\u2013298 (2013).","journal-title":"Selected Areas Commun. IEEE J."},{"key":"601_CR30","doi-asserted-by":"publisher","first-page":"510251","DOI":"10.1155\/2015\/510251","volume":"2015","author":"A Esfahani","year":"2015","unstructured":"A Esfahani, D Yang, G Mantas, A Nascimento, J Rodriguez, Dual-homomorphic message authentication code scheme for network coding-enabled wireless sensor networks. Int. J. Distributed Sensor Netw.2015:, 510251 (2015). doi: 10.1155\/2015\/510251 . Accessed 2015-02-06.","journal-title":"Int. J. Distributed Sensor Netw."},{"key":"601_CR31","first-page":"708","volume-title":"INFOCOM\u201999. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE","author":"R Canetti","year":"1999","unstructured":"R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas, in INFOCOM\u201999. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, 2. Multicast security: a taxonomy and some efficient constructions (IEEENew York, NY, USA, 1999), pp. 708\u2013716."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0601-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0601-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0601-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0601-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T18:49:49Z","timestamp":1692298189000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0601-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,22]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["601"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0601-9","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,22]]},"article-number":"113"}}