Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding

Network coding (NC) can be applied to achieve the maximal information flow in a network. In energy-constraint wireless networks such as wireless sensor networks, applying NC can further reduce the number of wireless transmissions and hence prolong the life time of sensor nodes. Although applying NC...

Full description

Saved in:
Bibliographic Details
Main Authors: Jen-Yeu Chen, Yi-Ying Tseng
Format: Article
Language:English
Published: Wiley 2012-12-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2012/758340
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832556665333874688
author Jen-Yeu Chen
Yi-Ying Tseng
author_facet Jen-Yeu Chen
Yi-Ying Tseng
author_sort Jen-Yeu Chen
collection DOAJ
description Network coding (NC) can be applied to achieve the maximal information flow in a network. In energy-constraint wireless networks such as wireless sensor networks, applying NC can further reduce the number of wireless transmissions and hence prolong the life time of sensor nodes. Although applying NC in wireless networks is obviously beneficial, it is possible that a malicious node (Byzantine attacker) can take advantage of the inherent vulnerability of error propagation in the NC scheme to corrupt all the information transmissions. In the NC scheme, an intermediate node linearly combines several incoming messages as its outgoing messages. Thus a data error injected in any intermediate nodes will corrupt the information reaching a destination. Recent research efforts have shown that NC can be combined with classical error control codes and cryptography for secure communications or misbehavior detections. Nevertheless, when it comes to Byzantine attacks, these results have limited effects. In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with random linear network coding (RLNC). To the best of our knowledge, our work is the first to address the problem of Byzantine failures in a wireless network with RLNC.
format Article
id doaj-art-39a521ea8ca243899c69807974cebe00
institution Kabale University
issn 1550-1477
language English
publishDate 2012-12-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-39a521ea8ca243899c69807974cebe002025-02-03T05:44:35ZengWileyInternational Journal of Distributed Sensor Networks1550-14772012-12-01810.1155/2012/758340Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network CodingJen-Yeu ChenYi-Ying TsengNetwork coding (NC) can be applied to achieve the maximal information flow in a network. In energy-constraint wireless networks such as wireless sensor networks, applying NC can further reduce the number of wireless transmissions and hence prolong the life time of sensor nodes. Although applying NC in wireless networks is obviously beneficial, it is possible that a malicious node (Byzantine attacker) can take advantage of the inherent vulnerability of error propagation in the NC scheme to corrupt all the information transmissions. In the NC scheme, an intermediate node linearly combines several incoming messages as its outgoing messages. Thus a data error injected in any intermediate nodes will corrupt the information reaching a destination. Recent research efforts have shown that NC can be combined with classical error control codes and cryptography for secure communications or misbehavior detections. Nevertheless, when it comes to Byzantine attacks, these results have limited effects. In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with random linear network coding (RLNC). To the best of our knowledge, our work is the first to address the problem of Byzantine failures in a wireless network with RLNC.https://doi.org/10.1155/2012/758340
spellingShingle Jen-Yeu Chen
Yi-Ying Tseng
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
International Journal of Distributed Sensor Networks
title Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
title_full Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
title_fullStr Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
title_full_unstemmed Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
title_short Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
title_sort distributed intrusion detection of byzantine attacks in wireless networks with random linear network coding
url https://doi.org/10.1155/2012/758340
work_keys_str_mv AT jenyeuchen distributedintrusiondetectionofbyzantineattacksinwirelessnetworkswithrandomlinearnetworkcoding
AT yiyingtseng distributedintrusiondetectionofbyzantineattacksinwirelessnetworkswithrandomlinearnetworkcoding