Skip to main content

Lightweight Security for WSN Based on Network Coding

  • Conference paper
  • First Online:
Communications, Signal Processing, and Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 202))

  • 1857 Accesses

Abstract

The application of network coding has been improving the performance of Wireless Sensor Networks (WSN). Compared with previous, the security performance has been improved. But when faced with security attacks—especially eavesdroppers, the security of the WSN still needs to be improved. A Lightweight Permutation Encryption Coding (LPEC) is proposed in this chapter, which Combines with secure network coding and permutation encryption algorithm. Unlike end-to-end encryption, which encrypts the whole text, LPEC only encrypts the Local Encoding Vector (LEV), and hide it by permutation encryption. The mechanism effectively reduces the encryption complexity, and thwarts global eavesdroppers. At the same time, it improves the security performance for communication between WSN nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. LI SY-R, CAI N (2003) Linear network coding. IEEE Trans Inf Theory 49(2):371–381

    Article  MathSciNet  MATH  Google Scholar 

  2. Tan J, M´edard M (2006) Secure network coding with a cost criterion.In: Proceedings of 4th international symposium on modeling and optimization in mobile, ad hoc and wireless networks (WiOpt’06), Boston, April 2006

    Google Scholar 

  3. Fan Y, Jiang Y, Zhu H, Shen X (2009) An efficient privacy-preserving scheme against traffic analysis attacks in network coding. IEEE INFOCOM

    Google Scholar 

  4. Fathy A, ElBatt T (2011) SANC: source authentication using network oding. The first workshop on security in computers, networking and communication

    Google Scholar 

  5. Zhang P, Jiang P, Lin C, Fan Y, Shen X (2010) P-coding: secure network coding against eavesdropping attacks. IEEE INFOCOM

    Google Scholar 

  6. Bhattad K, Narayanan KR (2005) Weakly secure network coding. In: Proceedings of the first workshop on network coding, theory, & applications

    Google Scholar 

  7. Yu Z, Wei Y, Ramkumar B, Guan Y (2008) An efficient signature-based scheme for securing network coding against pollution attacks. IEEE INFOCOM

    Google Scholar 

  8. Vilela JP, Lima L, Barros J (2008) Lightweight security for network coding. In: IEEE international conference on communications (ICC)

    Google Scholar 

Download references

Acknowledgments

This work was supported by Important National Scenes & Technology Specific Projects (2010ZX03006-006), NSFC (61171176), Scientific Research Fund of Zhejiang Provincial Education Department under Grant No. Y201225956 and Natural Science Foundation of Ningbo under Grant No. 2012A610015.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xu Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media New York

About this paper

Cite this paper

Lu, X., Jiang, T. (2012). Lightweight Security for WSN Based on Network Coding. In: Liang, Q., et al. Communications, Signal Processing, and Systems. Lecture Notes in Electrical Engineering, vol 202. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5803-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5803-6_12

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5802-9

  • Online ISBN: 978-1-4614-5803-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics