Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Network coding (NC) can be applied to achieve the maximal information flow in a network. In energy-constraint wireless networks such as wireless sensor networks, applying NC can further reduce the number of wireless transmissions and hence prolong the life time of sensor nodes. Although applying NC...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2012-12-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2012/758340 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832556665333874688 |
---|---|
author | Jen-Yeu Chen Yi-Ying Tseng |
author_facet | Jen-Yeu Chen Yi-Ying Tseng |
author_sort | Jen-Yeu Chen |
collection | DOAJ |
description | Network coding (NC) can be applied to achieve the maximal information flow in a network. In energy-constraint wireless networks such as wireless sensor networks, applying NC can further reduce the number of wireless transmissions and hence prolong the life time of sensor nodes. Although applying NC in wireless networks is obviously beneficial, it is possible that a malicious node (Byzantine attacker) can take advantage of the inherent vulnerability of error propagation in the NC scheme to corrupt all the information transmissions. In the NC scheme, an intermediate node linearly combines several incoming messages as its outgoing messages. Thus a data error injected in any intermediate nodes will corrupt the information reaching a destination. Recent research efforts have shown that NC can be combined with classical error control codes and cryptography for secure communications or misbehavior detections. Nevertheless, when it comes to Byzantine attacks, these results have limited effects. In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with random linear network coding (RLNC). To the best of our knowledge, our work is the first to address the problem of Byzantine failures in a wireless network with RLNC. |
format | Article |
id | doaj-art-39a521ea8ca243899c69807974cebe00 |
institution | Kabale University |
issn | 1550-1477 |
language | English |
publishDate | 2012-12-01 |
publisher | Wiley |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj-art-39a521ea8ca243899c69807974cebe002025-02-03T05:44:35ZengWileyInternational Journal of Distributed Sensor Networks1550-14772012-12-01810.1155/2012/758340Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network CodingJen-Yeu ChenYi-Ying TsengNetwork coding (NC) can be applied to achieve the maximal information flow in a network. In energy-constraint wireless networks such as wireless sensor networks, applying NC can further reduce the number of wireless transmissions and hence prolong the life time of sensor nodes. Although applying NC in wireless networks is obviously beneficial, it is possible that a malicious node (Byzantine attacker) can take advantage of the inherent vulnerability of error propagation in the NC scheme to corrupt all the information transmissions. In the NC scheme, an intermediate node linearly combines several incoming messages as its outgoing messages. Thus a data error injected in any intermediate nodes will corrupt the information reaching a destination. Recent research efforts have shown that NC can be combined with classical error control codes and cryptography for secure communications or misbehavior detections. Nevertheless, when it comes to Byzantine attacks, these results have limited effects. In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with random linear network coding (RLNC). To the best of our knowledge, our work is the first to address the problem of Byzantine failures in a wireless network with RLNC.https://doi.org/10.1155/2012/758340 |
spellingShingle | Jen-Yeu Chen Yi-Ying Tseng Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding International Journal of Distributed Sensor Networks |
title | Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding |
title_full | Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding |
title_fullStr | Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding |
title_full_unstemmed | Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding |
title_short | Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding |
title_sort | distributed intrusion detection of byzantine attacks in wireless networks with random linear network coding |
url | https://doi.org/10.1155/2012/758340 |
work_keys_str_mv | AT jenyeuchen distributedintrusiondetectionofbyzantineattacksinwirelessnetworkswithrandomlinearnetworkcoding AT yiyingtseng distributedintrusiondetectionofbyzantineattacksinwirelessnetworkswithrandomlinearnetworkcoding |