Date Added: Mar 2011
Modern multi-hop wireless networks employ a number of sophisticated schemes to secure the network against hostile attacks. However, constant improvements in any security mechanism is matched by ever increasing attacks. Therefore, there is a critical and constant need to develop newer innovative schemes, especially for applications where the integrity of the message is vital. Attacks from trusted byzantine nodes that belong to the network itself are particularly challenging, as these nodes have a hidden malicious component and have complete access to the network resources. Previous works have studied these attacks and counter measures, on multi-hop networks and on networks capable of performing Network coding.