9
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Network Coding Based Security for Routing Attacks in WRN: Frechet Interference and Rayleigh Outage Evaluation

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We present a network coding security method capable of detecting several routing attacks in wireless reconfigurable networks. Routing security attacks include selective forwarding, black holes, and wormholes. The proposed method performs linear network coding over intermediate nodes composing a given route, not only to distribute content, but also to provide data confidentiality by cooperation as a mechanism of detection. The method presents a robust, accurate and fast response under security attacks for varying network conditions, such as interference and outage due to channel fading. It also provides a gain in network throughput by increasing the number of successfully received packets without a significant increase of the bandwidth usage.

          Translated abstract

          Presentamos un método basado en codificación de red capaz de detectar ataques de seguridad a la información de ruteo en redes inalámbricas reconfigurables. Los ataques de seguridad a la información de ruteo incluyen ataques como el envío selectivo de datos, agujeros negros y gusanos. El método propuesto realiza una codificación de red lineal en los nodos intermedios de una ruta determinada, para distribuir datos y para proveer confidencialidad por medio de un mecanismo cooperativo de detección. El método presenta una respuesta robusta, rápida y precisa ante ataques de seguridad bajo condiciones de red variables, tales como interferencia y pérdida de comunicación debido al desvanecimiento del canal. También incrementa los datos que llegan al destino sin incrementar significativamente el uso del ancho de banda.

          Related collections

          Most cited references16

          • Record: found
          • Abstract: not found
          • Article: not found

          Network information flow

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Location-Aware Security Services for Wireless Sensor Networks Using Network Coding

                Bookmark

                Author and article information

                Journal
                jart
                Journal of applied research and technology
                J. appl. res. technol
                UNAM, Centro de Ciencias Aplicadas y Desarrollo Tecnológico (México, DF, Mexico )
                1665-6423
                2448-6736
                August 2011
                : 9
                : 2
                : 188-201
                Affiliations
                [01] Torreón Coahuila orgnameInstituto Tecnológico y de Estudios Superiores de Monterrey México rafaela.villalpando@ 123456itesm.mx
                [02] Monterrey Nuevo León orgnameInstituto Tecnológico y de Estudios Superiores de Monterrey México
                Article
                S1665-64232011000200006 S1665-6423(11)00900200006
                a8bd7e43-489c-467b-9222-c60810525b18

                This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

                History
                Page count
                Figures: 0, Tables: 0, Equations: 0, References: 9, Pages: 14
                Product

                SciELO Mexico


                sinkholes,Network coding,selective forwarding,Frechet,outage

                Comments

                Comment on this article