2020
DOI: 10.3390/s20041180
|View full text |Cite
|
Sign up to set email alerts
|

Attack Detection Using Network Coding in IoT Environment

Abstract: Network coding is a reasonable way to increase network efficiency in response to an increase of sensed data in the Internet of Things (IoT). In network coding, intermediate nodes combine packets received from neighboring nodes, transform, and transmit encoded packets that can be decoded at the destination. This scheme is based on trust among nodes. If any malicious node joins the network, it can act as an intermediate node that could fabricate encoded packets. It might be more difficult to identify the authent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…What makes it even more difficult to distinguish the valid encoded packets from malicious ones, is that the packets received by the receiver are combined with several other packets originating from multiple sources. In an attempt to address this issue, Lee and Lee, (2020) propose a method to detect compromised packets among the packets received at the receiver in an IoT environment that adopts NC for data recovery. Their detection method enables the receiver to identify the valid packet amongst the "look-like-valid" packets without requiring retransmissions.…”
Section: Network Coding (Nc)mentioning
confidence: 99%
“…What makes it even more difficult to distinguish the valid encoded packets from malicious ones, is that the packets received by the receiver are combined with several other packets originating from multiple sources. In an attempt to address this issue, Lee and Lee, (2020) propose a method to detect compromised packets among the packets received at the receiver in an IoT environment that adopts NC for data recovery. Their detection method enables the receiver to identify the valid packet amongst the "look-like-valid" packets without requiring retransmissions.…”
Section: Network Coding (Nc)mentioning
confidence: 99%