{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00077980","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"77980","title":["汚染攻撃に耐性を持つXORネットワーク符号化の比較・評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"7136b78b-1ee8-4fad-a820-3eb6202b8dd5"},"_deposit":{"id":"77980","pid":{"type":"depid","value":"77980","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"汚染攻撃に耐性を持つXORネットワーク符号化の比較・評価","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"汚染攻撃に耐性を持つXORネットワーク符号化の比較・評価"},{"subitem_title":"Comparison of XOR Network Coding against Pollution Attacks","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ユビキタスセキュリティ(2)","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"北陸先端科学技術大学院大学"},{"subitem_text_value":"北陸先端科学技術大学院大学"},{"subitem_text_value":"北陸先端科学技術大学院大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Japan Advanced Institute of Science and Technology","subitem_text_language":"en"},{"subitem_text_value":"Japan Advanced Institute of Science and Technology","subitem_text_language":"en"},{"subitem_text_value":"Japan Advanced Institute of Science and Technology","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/77980/files/IPSJCSS2011085.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011085.pdf","filesize":[{"value":"481.6 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"4b57308b-1e13-490f-aa27-645120ddfded","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"伊澤, 和也"},{"creatorName":"宮地, 充子"},{"creatorName":"面, 和成"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kazuya, Izawa","creatorNameLang":"en"},{"creatorName":"Atsuko, Miyaji","creatorNameLang":"en"},{"creatorName":"Kazumasa, Omote","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"2009年にYuらが提案したネットワーク符号化方式はXOR演算を使用した方式として初めて汚染攻撃への耐性を実現した.ここではノード間通信に鍵プール方式を採用し,完全性確保に使用されるMACの検証を転送ノードで行う.しかしながら,メッセージに処理を加える際,それに付加されたMACは未処理となるという課題が残る.本稿では,センサネットワークにおけるXORネットワーク符号化に関する2つの既存研究を比較・評価する.さらに,Yuらの方式において,MACの数を減らすためにMACをアグリゲーションする改良を行い,その有効性を示した.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In 2009, Yu et al. proposed a solution of XOR network coding, which is the first solution to pollution attacks. It uses probabilistic key pre-distribution and message authentication codes (MACs) for communications between nodes. In this way, forwarders verify the MACs to provide data integrity. But in the network coding process, the attached MACs leave unprocessed. In this paper, we do comparative evaluation of two existing works on XOR network coding in wireless sensor networks. Furthermore, in order to reduce the number of MACs in the Yu's scheme, we performed improvement which aggregates MACs and show the validity.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"503","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"498","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"updated":"2025-01-21T20:42:42.916196+00:00","created":"2025-01-18T23:33:27.201422+00:00","links":{},"id":77980}