B. Wu, J. Chen, J. Wu, and M. Cardei, A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless Network Security, ser. Signals and Communication Technology, pp.103-135, 2007.
DOI : 10.1007/978-0-387-33112-6_5

H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, Security in mobile ad hoc networks: challenges and solutions, IEEE Wireless Communications, vol.11, issue.1, pp.38-47, 2004.
DOI : 10.1109/MWC.2004.1269716

J. Pearl, Probabilistic reasoning in intelligent systems: networks of plausible inference, 1988.

D. Mackay, Information Theory, Inference and Learning Algorithms, 2003.

J. Yedidia, W. Freeman, and Y. Weiss, Constructing Free-Energy Approximations and Generalized Belief Propagation Algorithms, IEEE Transactions on Information Theory, vol.51, issue.7, pp.2282-2312, 2005.
DOI : 10.1109/TIT.2005.850085

T. Schierl, S. Johansen, A. Perkis, and T. Wiegand, Rateless scalable video coding for overlay multisource streaming in MANETs, Journal of Visual Communication and Image Representation, vol.19, issue.8, pp.500-507, 2008.
DOI : 10.1016/j.jvcir.2008.06.004

V. R. Syrotiuk, C. J. Colbourn, and S. Yellamraju, Rateless Forward Error Correction for Topology-Transparent Scheduling, IEEE/ACM Transactions on Networking, vol.16, issue.2, pp.464-472, 2008.
DOI : 10.1109/TNET.2007.899018

S. Agrawal and D. Boneh, Homomorphic MACs: MAC-Based Integrity for Network Coding, Applied Cryptography and Network Security, pp.292-305, 2009.
DOI : 10.1007/978-3-642-01957-9_18

J. Dong, R. Curtmola, and C. Nita-rotaru, Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.111-122, 2009.
DOI : 10.1145/1514274.1514292

Y. Li, H. Yao, M. Chen, S. Jaggi, and A. Rosen, RIPPLE Authentication for Network Coding, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010.
DOI : 10.1109/INFCOM.2010.5462051

A. Newell and C. Nita-rotaru, Split Null Keys: A null space based defense for pollution attacks in wireless network coding, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp.479-487, 2012.
DOI : 10.1109/SECON.2012.6275815

Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, MIS: Malicious nodes identification scheme in network-coding-based peer-topeer streaming, IEEE INFOCOM 2010, pp.1-5, 2010.
DOI : 10.1109/infcom.2010.5462226

R. Gaeta, M. Grangetto, and R. Loti, SIEVE: A Distributed, Accurate, and Robust Technique to Identify Malicious Nodes in Data Dissemination on MANET, 2012 IEEE 18th International Conference on Parallel and Distributed Systems, pp.331-338, 2012.
DOI : 10.1109/ICPADS.2012.53

URL : https://hal.archives-ouvertes.fr/hal-00911098

M. Luby, LT codes, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings., pp.271-280, 2002.
DOI : 10.1109/SFCS.2002.1181950

R. Gallager, Low-Density Parity-Check Codes. Cambridge: M.I, 1963.

W. T. Freeman, E. C. Pasztor, and O. T. Carmichael, Learning low-level vision, Proceedings of the Seventh IEEE International Conference on Computer Vision, pp.25-47, 2000.
DOI : 10.1109/ICCV.1999.790414

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.8559

M. Luby, M. Mitzenmacher, M. Shokrollahi, and D. Spielman, Improved low-density parity-check codes using irregular graphs, IEEE Transactions on Information Theory, vol.47, issue.2, pp.585-598, 2001.
DOI : 10.1109/18.910576

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.6057

G. F. Riley and T. R. Henderson, The ns-3 network simulator, " in Modeling and Tools for Network Simulation, pp.15-34, 2010.

M. N. Krohn, M. J. Freedman, and D. Mazieres, On-the-fly verification of rateless erasure codes for efficient content distribution, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004.
DOI : 10.1109/SECPRI.2004.1301326

C. Gkantsidis and P. Rodriguez, Cooperative Security for Network Coding File Distribution, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006.
DOI : 10.1109/INFOCOM.2006.233

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.3400

Q. Li, D. Chiu, and J. Lui, On the Practical and Security Issues of Batch Content Distribution Via Network Coding, Proceedings of the 2006 IEEE International Conference on Network Protocols, 2006.
DOI : 10.1109/ICNP.2006.320209

D. Kamal, D. Charles, K. Jain, and K. Lauter, Signatures for network coding, 40th Annual Conference on Information Sciences and Systems, 2006.

Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, An efficient signaturebased scheme for securing network coding against pollution attacks, IEEE INFOCOM, 2008.
DOI : 10.1109/infocom.2008.199

E. Kehdi and B. Li, Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, 2009.
DOI : 10.1109/INFCOM.2009.5062036

Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, 2009.
DOI : 10.1109/INFCOM.2009.5061945

T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros et al., Byzantine Modification Detection in Multicast Networks With Random Network Coding, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2798-2803, 2008.
DOI : 10.1109/TIT.2008.921894

S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi et al., Resilient Network Coding in the Presence of Byzantine Adversaries, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2596-2603, 2008.
DOI : 10.1109/TIT.2008.921711

R. Koetter and F. Kschischang, Coding for Errors and Erasures in Random Network Coding, IEEE Transactions on Information Theory, vol.54, issue.8, pp.3579-3591, 2008.
DOI : 10.1109/TIT.2008.926449

URL : http://arxiv.org/abs/cs/0703061

Y. Li and J. C. Lui, Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems, Performance Evaluation, vol.67, issue.11, pp.1273-1288, 2010.
DOI : 10.1016/j.peva.2010.08.005

Y. Li and J. Lui, Identifying pollution attackers in networkcoding enabled wireless mesh networks, 20th International Conference on Computer Communications and Networks (ICCCN), aug 2011, pp.1-6
DOI : 10.1109/icccn.2011.6005878

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.9816

X. Jin and S. G. Chan, Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring, ACM Transactions on Multimedia Computing, Communications, and Applications, vol.6, issue.2, pp.1-918, 2010.
DOI : 10.1145/1671962.1671965