Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2012, Article ID 184783, 14 pages
http://dx.doi.org/10.1155/2012/184783
Research Article

Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures

1CITI laboratory, INSA-Lyon, INRIA, Université de Lyon, 69621 Lyon, France
2Department of Computer Science and Technology, East China Normal University, No. 500 Dongchuan Road, Shanghai 200241, China

Received 27 April 2012; Revised 30 July 2012; Accepted 27 September 2012

Academic Editor: Gildas Avoine

Copyright © 2012 Yuanyuan Zhang and Marine Minier. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [3 citations]

The following is the list of published articles that have cited the current article.

  • Karel Heurtefeux, Ochirkhand Erdene-Ochir, Nasreen Mohsin, Hamid Menouar, Karel Heurtefeux, Ochirkhand Erdene-Ochir, Nasreen Mohsin, and Hamid Menouar, “Enhancing RPL Resilience Against Routing Layer Insider Attacks,” 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp. 802–807, . View at Publisher · View at Google Scholar
  • Alvaro Diaz, and Pablo Sanchez, “Simulation of Attacks for Security in Wireless Sensor Network,” Sensors, vol. 16, no. 11, pp. 1932, 2016. View at Publisher · View at Google Scholar
  • Pablo Peñil, Alvaro Díaz, Hector Posadas, Julio Medina, and Pablo Sánchez, “High-Level Design of Wireless Sensor Networks for Performance Optimization Under Security Hazards,” ACM Transactions on Sensor Networks, vol. 13, no. 3, pp. 1–37, 2017. View at Publisher · View at Google Scholar