Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Network coding (NC) can be applied to achieve the maximal information flow in a network. In energy-constraint wireless networks such as wireless sensor networks, applying NC can further reduce the number of wireless transmissions and hence prolong the life time of sensor nodes. Although applying NC...
Saved in:
Main Authors: | Jen-Yeu Chen, Yi-Ying Tseng |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2012-12-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2012/758340 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Intrusion Detection for Routing Attacks in Sensor Networks
by: Chong Eik Loo, et al.
Published: (2006-01-01) -
CUSUM-Based Intrusion Detection Mechanism for Wireless Sensor Networks
by: Bishan Ying
Published: (2014-01-01) -
Survey on Byzantine attacks and defenses in federated learning
by: ZHAO Xiaojie, et al.
Published: (2024-12-01) -
Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks
by: Prathaban Mookiah, et al.
Published: (2013-10-01) -
Dynamic nonlinear control strategies for resilient heterogeneous vehicle platooning and handling Byzantine attacks in communication networks
by: Ammar Alsinai, et al.
Published: (2025-01-01)