Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 3729046, 13 pages
https://doi.org/10.1155/2018/3729046
Research Article

Secure Data Delivery with Linear Network Coding for Multiple Multicasts with Multiple Streams in Internet of Things

School of Computer Science and Technology, Soochow University, China

Correspondence should be addressed to Yihuai Wang; nc.ude.adus@wiauhiy

Received 15 January 2018; Accepted 2 May 2018; Published 13 June 2018

Academic Editor: Pedro Peris-Lopez

Copyright © 2018 Lianmin Shi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: a survey on enabling technologies, protocols, and applications,” IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347–2376, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. L. Atzori, A. Iera, and G. Morabito, “The internet of things: a survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. R. Bassoli, H. Marques, J. Rodriguez, K. W. Shum, and R. Tafazolli, “Network coding theory: A survey,” IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 1950–1978, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. S. R. Li, R. W. Yeung, and N. Cai, “Linear network coding,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 49, no. 2, pp. 371–381, 2003. View at Publisher · View at Google Scholar · View at MathSciNet
  5. D. S. Lun, N. Ratnakar, R. Koetter, D. R. Karger, T. Ho, and E. Ahmed, “Minimum-cost multicast over coded packet networks,” IEEE/ACM Transactions on Networking, vol. 52, no. 6, pp. 2608–2623, 2006. View at Publisher · View at Google Scholar · View at MathSciNet
  6. M. A. Raayatpanah, H. Salehi Fathabadi, B. H. Khalaj, and S. Khodayifar, “Minimum cost multiple multicast network coding with quantized rates,” Computer Networks, vol. 57, no. 5, pp. 1113–1123, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung, “Network information flow,” Institute of Electrical and Electronics Engineers Transactions on Information Theory, vol. 46, no. 4, pp. 1204–1216, 2000. View at Publisher · View at Google Scholar · View at MathSciNet
  8. H. Ghasvari, M. A. Raayatpanah, B. H. Khalaj, and H. Bakhshi, “Optimal sub-graph selection over coded networks with delay and limited-size buffering,” IET Communications, vol. 5, no. 11, pp. 1497–1505, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. Y. Wu and S.-Y. Kung, “Distributed utility maximization for network coding based multicasting: a shortest path approach,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 8, pp. 1475–1488, 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. K. Bhattad and K. R. Narayanan, “Weakly secure network coding,” in Proceedings of the 1st Workshop on Network Coding, Theory, and Applications (NetCod), pp. 1–6, 2005.
  11. J. Wang, J. Wang, K. Lu, B. Xiao, and N. Gu, “Optimal linear network coding design for secure unicast with multiple streams,” in Proceedings of the 29th IEEE International Conference on Computer Communications (INFOCOM), pp. 2240–2248, San Diego, CA, USA, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. X. Chang, J. Wang, J. Wang, V. Lee, K. Lu, and Y. Yang, “On achieving maximum secure throughput using network coding against wiretap attack,” in Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 526–535, Genoa, Italy, June 2010. View at Publisher · View at Google Scholar
  13. X. Chang, J. Wang, and V. Lee, “Modeling and optimal design of linear network coding for secure unicast with multiple streams,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 10, pp. 2025–2035, 2013. View at Google Scholar
  14. J. Wang, J. Wang, K. Lu, Y. Qian, and N. Gu, “On the optimal linear network coding design for information theoretically secure unicast streaming,” IEEE Transactions on Multimedia, vol. 18, no. 6, pp. 1149–1162, 2016. View at Publisher · View at Google Scholar · View at Scopus
  15. J. Wang, J. Wang, K. Lu, Y. Qian, B. Xiao, and N. Gu, “Optimal design of linear network coding for information theoretically secure unicast,” in Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM), pp. 757–765, Shanghai, China, April 2011. View at Publisher · View at Google Scholar
  16. E. Magli, M. Wang, P. Frossard, and A. Markopoulou, “Network coding meets multimedia: a review,” IEEE Transactions on Multimedia, vol. 15, no. 5, pp. 1195–1212, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. J. Feldman, T. Malkin, A. R. Servedio, and C. Stein, “On the capacity of secure network coding,” in Proceedings of the 42nd Annual Allerton Conference on Communication, Control, and Computing, 2004.
  18. N. Cai and R. W. Yeung, “Secure network coding on a wiretap network,” IEEE Transactions on Information Theory, vol. 57, no. 1, pp. 424–435, 2011. View at Publisher · View at Google Scholar · View at MathSciNet
  19. Z. Wen, J. Wang, K. Lu, J. Zhou, Z. Gao, and Y. Zhu, “Optimal rate allocation and linear network coding design for secure multicast with multiple streams,” in Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications, pp. 1037–1044, Sydney, Australia, December 2016. View at Publisher · View at Google Scholar · View at Scopus
  20. B. M. Waxman, “Routing of multipoint connections,” IEEE Journal on Selected Areas in Communications, vol. 6, no. 9, pp. 1617–1622, 1988. View at Publisher · View at Google Scholar · View at Scopus