{"id":"https://openalex.org/W2091396812","doi":"https://doi.org/10.1109/milcom.2012.6415857","title":"Securing wireless network coding against pollution attack at the physical layer","display_name":"Securing wireless network coding against pollution attack at the physical layer","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2091396812","doi":"https://doi.org/10.1109/milcom.2012.6415857","mag":"2091396812"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2012.6415857","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2012.6415857","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073997722","display_name":"Sang Wu Kim","orcid":"https://orcid.org/0000-0003-3322-7909"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sang Wu Kim","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, USA","[Department of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011]"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"[Department of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011]","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5073997722"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":0.7092,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73733825,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11827","display_name":"Polyomavirus and related diseases","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/2730","display_name":"Oncology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/retransmission","display_name":"Retransmission","score":0.9099377393722534},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.754071831703186},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.7533310651779175},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7443631887435913},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6156885027885437},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6145772337913513},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5415928363800049},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4588108956813812},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4519193470478058},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3396615982055664},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1576600968837738},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08177345991134644},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.07256466150283813}],"concepts":[{"id":"https://openalex.org/C180611318","wikidata":"https://www.wikidata.org/wiki/Q7316902","display_name":"Retransmission","level":3,"score":0.9099377393722534},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.754071831703186},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.7533310651779175},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7443631887435913},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6156885027885437},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6145772337913513},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5415928363800049},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4588108956813812},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4519193470478058},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3396615982055664},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1576600968837738},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08177345991134644},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.07256466150283813}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2012.6415857","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2012.6415857","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W599939251","https://openalex.org/W1521680667","https://openalex.org/W1651818244","https://openalex.org/W1667411252","https://openalex.org/W1743877615","https://openalex.org/W2059827048","https://openalex.org/W2096366572","https://openalex.org/W2106831077","https://openalex.org/W2107318550","https://openalex.org/W2130093830","https://openalex.org/W2137771025","https://openalex.org/W2143185888","https://openalex.org/W2153098283","https://openalex.org/W2155971664","https://openalex.org/W2161233410","https://openalex.org/W2162219773","https://openalex.org/W2563871604","https://openalex.org/W4212896000","https://openalex.org/W4243959868","https://openalex.org/W4300188436","https://openalex.org/W6637296345","https://openalex.org/W6637644075"],"related_works":["https://openalex.org/W2520306302","https://openalex.org/W2154280206","https://openalex.org/W3159885142","https://openalex.org/W2546221581","https://openalex.org/W2347926101","https://openalex.org/W2157629996","https://openalex.org/W2347917471","https://openalex.org/W2317536633","https://openalex.org/W1567265102","https://openalex.org/W1670167048"],"abstract_inverted_index":{"We":[0],"take":[1],"a":[2,91],"physical":[3],"layer":[4],"perspective":[5],"in":[6,27,45],"detecting":[7],"the":[8,18,23,37,46,50,58,63,69,82,96],"falsely":[9],"injected":[10],"vector":[11],"(pollution":[12],"attack)":[13],"and":[14,61],"removing":[15],"it":[16],"from":[17],"polluted":[19],"packet":[20,26],"to":[21,89],"restore":[22],"true":[24,64],"coded":[25,65,73],"wireless":[28],"network":[29],"coding":[30],"system.":[31],"The":[32,84],"proposed":[33,85],"scheme":[34,86],"builds":[35],"on":[36],"maximum":[38],"likelihood":[39],"detection":[40,53],"principle":[41],"which":[42],"is":[43,87],"optimal":[44],"sense":[47],"of":[48,52,71],"minimizing":[49],"probability":[51],"error.":[54],"It":[55],"discards":[56],"only":[57],"faulty":[59],"information":[60],"keeps":[62],"packet,":[66],"thereby":[67],"making":[68],"retransmission":[70],"new":[72],"packets":[74],"unnecessary.":[75],"This":[76],"allows":[77],"uninterrupted":[78],"communication":[79],"even":[80],"under":[81],"attack.":[83],"shown":[88],"provide":[90],"significant":[92],"reliability":[93],"gain":[94],"over":[95],"cryptographic":[97],"solution.":[98]},"counts_by_year":[{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
