Research Article

Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures

Figure 1

An example of flooding attack. Alice is the source who attempts to send encoded packets to the destination, Bob. Bob is supposed to forward an ACK to Alice once he successfully decodes a message. The adversary, Charlie, drops or delays the ACK: Alice never stops to transmit packets to Bob.
184783.fig.001