This document is a research work of a Doctorate in Information Technology and Communications of ITESM, in the field of examination environment, network coding applied to securing wireless reconfigurable networks under some physical impairments from several attacks. Wireless reconfigurable networks are prone to several routing security attacks such as sink holes, selective forwarding, black holes, wormholes and so on. Conventional security algorithms are processing expensive and vulnerable to central unit compromising. Network processing may provide several advantages in the implementation of distributed collaborative securing method for reconfigurable networks subject to security attacks. In this research work, we introduce a network coding...
Abstract: Previous research on security of network coding focused on the protection of data dissemin...
Part 1: Regular PapersInternational audienceIn this work, routing and spectrum allocation (RSA) algo...
In wireless networks, an attacker can tune a receiver and tap the communication between two nodes. W...
Abstract—Network coding is an elegant technique where, instead of simply relaying the packets of inf...
Abstract—In recent years, network coding has emerged as a new communication paradigm that can signif...
Wireless networks hold many applications and are an integral part of our lives. Security and reliabi...
In wireless networks, the bandwidth is considered one of the most scarce and valuable resources. The...
Network coding has been shown to be an effective approach to improve the wireless system performance...
Future communication networks need to harness the available spectrum more efficiently to cater the r...
In the network coding, throughput can be increased by allowing the transformation of the received da...
As wireless networks started to flourish, moving towards a more convenient and a simplified network ...
Reliable communication over the wireless network with high throughput is a major target for the next...
In this thesis we investigate the secure network coding problem. We are interested in both passive a...
Previous research on the security of network coding fo-cuses on the detection of pollution attacks. ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Abstract: Previous research on security of network coding focused on the protection of data dissemin...
Part 1: Regular PapersInternational audienceIn this work, routing and spectrum allocation (RSA) algo...
In wireless networks, an attacker can tune a receiver and tap the communication between two nodes. W...
Abstract—Network coding is an elegant technique where, instead of simply relaying the packets of inf...
Abstract—In recent years, network coding has emerged as a new communication paradigm that can signif...
Wireless networks hold many applications and are an integral part of our lives. Security and reliabi...
In wireless networks, the bandwidth is considered one of the most scarce and valuable resources. The...
Network coding has been shown to be an effective approach to improve the wireless system performance...
Future communication networks need to harness the available spectrum more efficiently to cater the r...
In the network coding, throughput can be increased by allowing the transformation of the received da...
As wireless networks started to flourish, moving towards a more convenient and a simplified network ...
Reliable communication over the wireless network with high throughput is a major target for the next...
In this thesis we investigate the secure network coding problem. We are interested in both passive a...
Previous research on the security of network coding fo-cuses on the detection of pollution attacks. ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Abstract: Previous research on security of network coding focused on the protection of data dissemin...
Part 1: Regular PapersInternational audienceIn this work, routing and spectrum allocation (RSA) algo...
In wireless networks, an attacker can tune a receiver and tap the communication between two nodes. W...