Mobility Investigate

Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding

Download now Free registration required

Executive Summary

Network Coding (NC) can be applied to achieve the maximal information flow in a network. In energy-constraint wireless networks such as wireless sensor networks, applying NC can further reduce the number of wireless transmissions and hence prolong the life time of sensor nodes. In this paper, a distributed algorithm is developed to effectively detect, locate, and isolate the Byzantine attackers in a wireless ad hoc network with Random Linear Network Coding (RLNC). To the best of the authors' knowledge, their work is the first to address the problem of Byzantine failures in a wireless network with RLNC.

  • Format: PDF
  • Size: 980.3 KB