{"title":"无线可重构网络中沉孔检测与防御的网络编码","authors":"R. Villalpando, C. Vargas, D. Muñoz","doi":"10.1109/ICSNC.2008.42","DOIUrl":null,"url":null,"abstract":"Wireless reconfigurable networks are prone to several security attacks such as selective forwarding, black holes, and wormholes. In this paper, we introduce a network coding method that detects security attacks related to routing. The proposed method works on a distributed fashion performing random network coding over nodes composing a given route, not only to distribute content, but also to provide data confidentiality by cooperation as a mechanism of detection. The method presents a robust, accurate and fast response under security attacks for varying network conditions, such as density and interference, and it also increases successfully received packets without a significant sacrifice of the bandwidth usage.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Network Coding for Detection and Defense of Sink Holes in Wireless Reconfigurable Networks\",\"authors\":\"R. Villalpando, C. Vargas, D. Muñoz\",\"doi\":\"10.1109/ICSNC.2008.42\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless reconfigurable networks are prone to several security attacks such as selective forwarding, black holes, and wormholes. In this paper, we introduce a network coding method that detects security attacks related to routing. The proposed method works on a distributed fashion performing random network coding over nodes composing a given route, not only to distribute content, but also to provide data confidentiality by cooperation as a mechanism of detection. The method presents a robust, accurate and fast response under security attacks for varying network conditions, such as density and interference, and it also increases successfully received packets without a significant sacrifice of the bandwidth usage.\",\"PeriodicalId\":105399,\"journal\":{\"name\":\"2008 Third International Conference on Systems and Networks Communications\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Third International Conference on Systems and Networks Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSNC.2008.42\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third International Conference on Systems and Networks Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSNC.2008.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network Coding for Detection and Defense of Sink Holes in Wireless Reconfigurable Networks
Wireless reconfigurable networks are prone to several security attacks such as selective forwarding, black holes, and wormholes. In this paper, we introduce a network coding method that detects security attacks related to routing. The proposed method works on a distributed fashion performing random network coding over nodes composing a given route, not only to distribute content, but also to provide data confidentiality by cooperation as a mechanism of detection. The method presents a robust, accurate and fast response under security attacks for varying network conditions, such as density and interference, and it also increases successfully received packets without a significant sacrifice of the bandwidth usage.