scispace - formally typeset
P

Peng Zhang

Researcher at Xi'an Jiaotong University

Publications -  53
Citations -  796

Peng Zhang is an academic researcher from Xi'an Jiaotong University. The author has contributed to research in topics: Network packet & Software-defined networking. The author has an hindex of 12, co-authored 51 publications receiving 604 citations. Previous affiliations of Peng Zhang include Tsinghua University.

Papers
More filters
Proceedings ArticleDOI

P-Coding: Secure Network Coding against Eavesdropping Attacks

TL;DR: P-Coding is proposed, a novel security scheme against eavesdropping attacks in network coding that can efficiently thwart global eavesdroppers in a transparent way and is also featured in scalability and robustness, which enable it to be integrated into practical network coded systems.
Proceedings ArticleDOI

Padding for orthogonality: Efficient subspace authentication for network coding

TL;DR: This paper proposes a unified scheme termed MacSig, the first hybrid-key cryptographic approach to network coding authentication that can thwart both normal pollution and tag pollution attacks in an efficient way and has a low bandwidth overhead.
Journal ArticleDOI

On Denial of Service Attacks in Software Defined Networks

TL;DR: A comprehensive study of DoS attacks in SDN is presented, and multi-layer fair queueing (MLFQ) is proposed, a simple but effective DoS mitigation method that enforces fair sharing of an SDN controller's resources with multiple layers of queues.
Journal ArticleDOI

A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks

TL;DR: P-Coding, a lightweight encryption scheme to provide confidentiality for network-coded MANETs in an energy-efficient way is proposed and it is demonstrated that due to its lightweight nature, P-C coding incurs minimal energy consumption compared to other encryption schemes.
Proceedings ArticleDOI

Mind the Gap: Monitoring the Control-Data Plane Consistency in Software Defined Networks

TL;DR: VeriDP is a tool that can continuously monitor what the authors call control-data plane consistency, defined as the consistency between control plane policies and data plane forwarding behaviors, and can localize faulty switches when verification fails.