Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 2 SI
Page No. 6240 - 6243

Efficient Improved Weakly Secure Network Segmentation using DKE

Authors : Kirti Walia, Vijay Dhir, S.N. Panda and Ashok Kumar

References

Ahlswede, R., N. Cai, S.Y.R. Li and R.W. Yeung, 2000. Network information flow. IEEE Trans. Inform. Theory, 46: 1204-1216.
CrossRef  |  

Dong, J., R. Curtmola, R. Sethi and C. Nita-Rotaru, 2008. Toward secure network coding in wireless networks: Threats and challenges. Proceedings of the 4th Workshop on Secure Network Protocols (NPSec 2008), October 19, 2008, IEEE, Orlando, Florida, USA., ISBN:978-1-4244-2651-5, pp: 33-38.

Du, R., C. Zhao, F. Zhao and S. Li, 2015. Strategies of network coding against nodes conspiracy attack. Secur. Commun. Networks, 8: 2396-2403.
CrossRef  |  Direct Link  |  

Du, R., C. Zhao, S. Li and J. Li, 2014. Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation. EURASIP. J. Wirel. Communi. Networking, 2014: 1-5.
CrossRef  |  Direct Link  |  

Jain, K., 2004. Security based on network topology against the wiretapping attack. IEEE Wireless Commun., 11: 68-71.
CrossRef  |  Direct Link  |  

Koetter, R. and M. Medard, 2003. An algebraic approach to network coding. IEEE/ACM Trans. Networking, 11: 782-796.
CrossRef  |  

Li, S.Y.R., R.W. Yeung and N. Cai, 2003. Linear network coding. IEEE Trans. Inform. Theory, 49: 371-381.
CrossRef  |  Direct Link  |  

Mills, A., B. Smith, T.C. Clancy, E. Soljanin and S. Vishwanath, 2008. On secure communication over wireless erasure networks. Proceedings of the IEEE International Symposium on Information Theory (ISIT 2008), July 6-11, 2008, IEEE, Toronto, Ontario, Canada, ISBN:978-1-4244-2256-2, pp: 161-165.

Silva, D. and F.R. Kschischang, 2009. Universal weakly secure network coding. Proceedings of the IEEE Information Theory Workshop on Networking and Information Theory (ITW 2009), June 10-12, 2009, IEEE, Volos, Greece, ISBN:978-1-4244-4535-6, pp: 281-285.

Walia, K., S.N. Panda and H.C. Agrawal, 2013. A pragmatic analysis on software firewalls. Intl. J. Eng. Sci. Innovative Technol., 2: 574-578.
Direct Link  |  

Walia, K., S.N. Panda and H.C. Agrawal, 2014. Effective architecture and algorithmic approach for secured firewall in sensor networks against assorted attacks. Intl. J. Multi Disciplinary Eng. Bus. Manage., 2: 36-41.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved