Detection and Defense Mechanism against Security Attacks in Reconfigurable Networks: Network Coding Approach

Hdl Handle:
http://hdl.handle.net/11285/572491
Title:
Detection and Defense Mechanism against Security Attacks in Reconfigurable Networks: Network Coding Approach
Authors:
Villalpando Hernández, Rafaela
Issue Date:
01/12/2008
Abstract:
This document is a research work of a Doctorate in Information Technology and Communications of ITESM, in the field of examination environment, network coding applied to securing wireless reconfigurable networks under some physical impairments from several attacks. Wireless reconfigurable networks are prone to several routing security attacks such as sink holes, selective forwarding, black holes, wormholes and so on. Conventional security algorithms are processing expensive and vulnerable to central unit compromising. Network processing may provide several advantages in the implementation of distributed collaborative securing method for reconfigurable networks subject to security attacks. In this research work, we introduce a network coding method that detects security attacks related the routing process. The proposed method works on a distributed fashion performing linear network coding over nodes composing a given route. The proposed methodology uses network coding not only to distribute content, but also to provide data confidentiality by cooperation as a mechanism of detection. The method provides a robust response for varying network conditions, such as large node density, high interference, and route failure due to Rayleigh channel fading. In this research work, we introduce an interference analysis of the proposed security method caused by the nearest neighbor to the route. We also introduce an outage probability analysis due to link failures in routes caused by a Rayleigh fading channel. The detection capabilities of the network coding based detection and defense method are analyzed under both impairments. The security method is faced to different attack probabilities, several network densities and transmission ranges, where parameters like packet overhead and successfully received packet as well as the detection accuracy of the method are analyzed throughout simulations. Finally, we provide an algebraic representation of a network implementing the proposed security method and formulate the sufficient conditions for feasibility of routes commanding the method. Also an alternative criterion for route selection is formulated in basis of the algebraic representation.
Keywords:
Mecanismo; Seguridad; Detección
Degree Program:
Programa de Graduados en Informática y Computación
Advisors:
Dr. César Vargas Rosales
Committee Member / Sinodal:
Dr. David Muñoz Rodríguez; Dr. Carlos Mex Perrera
Degree Level:
Doctor en Filosofía
School:
Escuela de Ingeniería
Campus Program:
Campus Monterrey
Discipline:
Ingeniería y Ciencias Aplicadas / Engineering & Applied Sciences
Appears in Collections:
Ciencias Exactas

Full metadata record

DC FieldValue Language
dc.contributor.advisorDr. César Vargas Rosaleses
dc.contributor.authorVillalpando Hernández, Rafaelaes
dc.date.accessioned2015-08-17T11:33:36Zen
dc.date.available2015-08-17T11:33:36Zen
dc.date.issued01/12/2008-
dc.identifier.urihttp://hdl.handle.net/11285/572491en
dc.description.abstractThis document is a research work of a Doctorate in Information Technology and Communications of ITESM, in the field of examination environment, network coding applied to securing wireless reconfigurable networks under some physical impairments from several attacks. Wireless reconfigurable networks are prone to several routing security attacks such as sink holes, selective forwarding, black holes, wormholes and so on. Conventional security algorithms are processing expensive and vulnerable to central unit compromising. Network processing may provide several advantages in the implementation of distributed collaborative securing method for reconfigurable networks subject to security attacks. In this research work, we introduce a network coding method that detects security attacks related the routing process. The proposed method works on a distributed fashion performing linear network coding over nodes composing a given route. The proposed methodology uses network coding not only to distribute content, but also to provide data confidentiality by cooperation as a mechanism of detection. The method provides a robust response for varying network conditions, such as large node density, high interference, and route failure due to Rayleigh channel fading. In this research work, we introduce an interference analysis of the proposed security method caused by the nearest neighbor to the route. We also introduce an outage probability analysis due to link failures in routes caused by a Rayleigh fading channel. The detection capabilities of the network coding based detection and defense method are analyzed under both impairments. The security method is faced to different attack probabilities, several network densities and transmission ranges, where parameters like packet overhead and successfully received packet as well as the detection accuracy of the method are analyzed throughout simulations. Finally, we provide an algebraic representation of a network implementing the proposed security method and formulate the sufficient conditions for feasibility of routes commanding the method. Also an alternative criterion for route selection is formulated in basis of the algebraic representation.en
dc.language.isoenen
dc.rightsOpen Accessen
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.titleDetection and Defense Mechanism against Security Attacks in Reconfigurable Networks: Network Coding Approachen
dc.typeTesis de Doctoradoes
thesis.degree.grantorInstituto Tecnológico y de Estudios Superiores de Monterreyes
thesis.degree.levelDoctor en Filosofíaes
dc.contributor.committeememberDr. David Muñoz Rodríguezes
dc.contributor.committeememberDr. Carlos Mex Perreraes
thesis.degree.disciplineEscuela de Ingenieríaes
thesis.degree.namePrograma de Graduados en Informática y Computaciónes
dc.subject.keywordMecanismoes
dc.subject.keywordSeguridades
dc.subject.keywordDetecciónes
thesis.degree.programCampus Monterreyes
dc.subject.disciplineIngeniería y Ciencias Aplicadas / Engineering & Applied Scienceses
All Items in REPOSITORIO DEL TECNOLOGICO DE MONTERREY are protected by copyright, with all rights reserved, unless otherwise indicated.