A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks, Wireless Network Security, ser. Signals and Communication Technology, pp.103-135, 2007. ,
DOI : 10.1007/978-0-387-33112-6_5
Security in mobile ad hoc networks: challenges and solutions, IEEE Wireless Communications, vol.11, issue.1, pp.38-47, 2004. ,
DOI : 10.1109/MWC.2004.1269716
Probabilistic reasoning in intelligent systems: networks of plausible inference, 1988. ,
Information Theory, Inference and Learning Algorithms, 2003. ,
Constructing Free-Energy Approximations and Generalized Belief Propagation Algorithms, IEEE Transactions on Information Theory, vol.51, issue.7, pp.2282-2312, 2005. ,
DOI : 10.1109/TIT.2005.850085
Rateless scalable video coding for overlay multisource streaming in MANETs, Journal of Visual Communication and Image Representation, vol.19, issue.8, pp.500-507, 2008. ,
DOI : 10.1016/j.jvcir.2008.06.004
Rateless Forward Error Correction for Topology-Transparent Scheduling, IEEE/ACM Transactions on Networking, vol.16, issue.2, pp.464-472, 2008. ,
DOI : 10.1109/TNET.2007.899018
Homomorphic MACs: MAC-Based Integrity for Network Coding, Applied Cryptography and Network Security, pp.292-305, 2009. ,
DOI : 10.1007/978-3-642-01957-9_18
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.111-122, 2009. ,
DOI : 10.1145/1514274.1514292
RIPPLE Authentication for Network Coding, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010. ,
DOI : 10.1109/INFCOM.2010.5462051
Split Null Keys: A null space based defense for pollution attacks in wireless network coding, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp.479-487, 2012. ,
DOI : 10.1109/SECON.2012.6275815
MIS: Malicious nodes identification scheme in network-coding-based peer-topeer streaming, IEEE INFOCOM 2010, pp.1-5, 2010. ,
DOI : 10.1109/infcom.2010.5462226
SIEVE: A Distributed, Accurate, and Robust Technique to Identify Malicious Nodes in Data Dissemination on MANET, 2012 IEEE 18th International Conference on Parallel and Distributed Systems, pp.331-338, 2012. ,
DOI : 10.1109/ICPADS.2012.53
URL : https://hal.archives-ouvertes.fr/hal-00911098
LT codes, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings., pp.271-280, 2002. ,
DOI : 10.1109/SFCS.2002.1181950
Low-Density Parity-Check Codes. Cambridge: M.I, 1963. ,
Learning low-level vision, Proceedings of the Seventh IEEE International Conference on Computer Vision, pp.25-47, 2000. ,
DOI : 10.1109/ICCV.1999.790414
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.8559
Improved low-density parity-check codes using irregular graphs, IEEE Transactions on Information Theory, vol.47, issue.2, pp.585-598, 2001. ,
DOI : 10.1109/18.910576
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.6057
The ns-3 network simulator, " in Modeling and Tools for Network Simulation, pp.15-34, 2010. ,
On-the-fly verification of rateless erasure codes for efficient content distribution, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004. ,
DOI : 10.1109/SECPRI.2004.1301326
Cooperative Security for Network Coding File Distribution, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.233
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.3400
On the Practical and Security Issues of Batch Content Distribution Via Network Coding, Proceedings of the 2006 IEEE International Conference on Network Protocols, 2006. ,
DOI : 10.1109/ICNP.2006.320209
Signatures for network coding, 40th Annual Conference on Information Sciences and Systems, 2006. ,
An efficient signaturebased scheme for securing network coding against pollution attacks, IEEE INFOCOM, 2008. ,
DOI : 10.1109/infocom.2008.199
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, 2009. ,
DOI : 10.1109/INFCOM.2009.5062036
An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, 2009. ,
DOI : 10.1109/INFCOM.2009.5061945
Byzantine Modification Detection in Multicast Networks With Random Network Coding, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2798-2803, 2008. ,
DOI : 10.1109/TIT.2008.921894
Resilient Network Coding in the Presence of Byzantine Adversaries, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2596-2603, 2008. ,
DOI : 10.1109/TIT.2008.921711
Coding for Errors and Erasures in Random Network Coding, IEEE Transactions on Information Theory, vol.54, issue.8, pp.3579-3591, 2008. ,
DOI : 10.1109/TIT.2008.926449
URL : http://arxiv.org/abs/cs/0703061
Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems, Performance Evaluation, vol.67, issue.11, pp.1273-1288, 2010. ,
DOI : 10.1016/j.peva.2010.08.005
Identifying pollution attackers in networkcoding enabled wireless mesh networks, 20th International Conference on Computer Communications and Networks (ICCCN), aug 2011, pp.1-6 ,
DOI : 10.1109/icccn.2011.6005878
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.9816
Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring, ACM Transactions on Multimedia Computing, Communications, and Applications, vol.6, issue.2, pp.1-918, 2010. ,
DOI : 10.1145/1671962.1671965