Secure Network Coding against Wiretapping and Byzantine Attacks
نویسندگان
چکیده
1 Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, P. O. Box 145, Beijing 100876, China 2Key Laboratory of Network and Information Attack and Defence Technology of MOE, Beijing University of Posts and Telecommunications, P. O. Box 145, Beijing 100876, China 3National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, P. O. Box 145, Beijing 100876, China
منابع مشابه
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Network coding is an elegant technique where, instead of simply relaying the packets of information they receive, the nodes of a network are allowed to combine several packets together for transmission and this technique can be used to achieve the maximum possible information flow in a network and save the needed number of packet transmissions. Moreover, in an energyconstraint wireless network ...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملSTONe: Secure Trusted Overlay Networks for Robust Privacy-Protecting Communication
This paper presents STONe, Secure Trusted Overlay Network, a novel robust network infrastructure that provides privacypreserving communication. STONe is the first network architecture based on attestation and strong process isolation in Trusted Computing. Using these features to protect the network stack against Byzantine failures, STONe is able to establish different protection techniques agai...
متن کاملAn On-Demand Byzantine-Resilient Secure Routing Protocol for Wireless Adhoc Networks
Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. We refer to any arbitrary action by authenticated nodes resulting in disruption of the routing service such as drop packets, modify packets and miss-route packets as Byzantine behavior, and to such an adversary as a Byzantine adversary. Nodes may exhibit Byzantine beh...
متن کاملMitigating Byzantine Attacks in Ad Hoc Wireless Networks
Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the network are referred to as Byzantine attacks. Traditional secure routing protocols are vulnerable to this class of attacks since they usually assume that once authenticated, a node can be trusted to execute the protocol correctly. We present a detailed description of several By...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EURASIP J. Wireless Comm. and Networking
دوره 2010 شماره
صفحات -
تاریخ انتشار 2010