SlideShare a Scribd company logo
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Abstract:
Network coding has been shown to be an effective approach to improve the
wireless system performance. However, many security issues impede its wide
deployment in practice. Besides the well-studied pollution attacks, there is another
severe threat, that of wormhole attacks, which undermines the performance gain of
network coding. Since the underlying characteristics of network coding systems
are distinctly different from traditional wireless networks, the impact of wormhole
attacks and countermeasures are generally unknown. In this paper, we quantify
wormholes’ devastating harmful impact on network coding system performance
through experiments. We first propose a centralized algorithm to detect wormholes
and show its correctness rigorously. For the distributed wireless network, we
proposes DAWN, Distributed detection Algorithm against Wormhole in wireless
Network coding systems, by exploring the change of the flow directions of the
innovative packets caused by wormholes. We rigorously prove that DAWN
guarantees a good lower bound of successful detection rate. We perform analysis
on the resistance of DAWN against collusion attacks.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Introduction:
In wireless network coding systems, the forwarders are allowed to apply
encoding schemes on what they receive, and thus they create and transmit new
packets. The idea of mixing packets on each node takes good advantages of the
opportunity diversity and broadcast nature of wireless communications, and
significantly enhances system performance.
Wireless network coding systems face new challenges and attacks, whose
impact and countermeasures are still not well understood because their underlying
characteristics are different from well-studied traditional wireless networks.
The wormhole attack is one of these attacks. In a wormhole attack, the
attacker can forward each packet using wormhole links and without modifies the
packet transmission by routing it to an unauthorized remote node. Hence, receiving
the rebroadcast packets by the attackers, some nodes will have the illusion that
they are close to the attacker.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Existing System:
Wireless network coding systems the routing and packet forwarding
procedures are different from those in traditional wireless networks wormhole
attacks severely imperil network coding protocols. In particular, if wormhole
attacks are launched in routing, the nodes close to attackers will receive more
packets than they should and be considered as having a good capability in help
forwarding packets. Thus they will be assigned with more responsibility in packet
forwarding than what they can actually provide. Furthermore, other nodes will be
correspondingly contributing less. This unfair distribution of workload will result
in inefficient resource utilization and reduce system performance. Wormhole
attacks launched during the data transmission phase can also be very harmful.
First, wormhole attacks can be used as the first step towards more sophisticated
attacks, such as man-in-the-middle attacks and entropy attacks.
Disadvantages:
 Wormhole attacks launched during the data transmission phase can also be
very harmful.
 Retransmitting the packets from the wormhole links, some victim nodes will
have to process much more non-innovative packets that will waste their
resources; these constitute entropy attacks.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Proposed System:
A wireless network design with a set of homogeneous nodes running
through network coding protocols, Nodes are connected via lossy wireless links.
In wormhole attacks, the attackers between distant locations transmit packets
using an out-of-band tunnel. The transmission tunnel is called a wormhole link.
The packet loss rate on the wormhole link is negligible. The kinds of the wormhole
links can be various, such as an Ethernet cable, an optical link, or a secured long-
range wireless transmission.
In the wireless network systems, we consider that public key infrastructure
(PKI) is in place to implement the public key cryptographic techniques. For the
wireless network, we regard each node1 as a user who has a pair of public and
private keys. The identity and the public key of each user are managed by the
certificate authority (CA), which is a trusted entity. If any node A wants to safely
communicate with node B, A has to request B’s public key from the CA first. After
the transmission, node B has to request A’s public key from the CA in order to
verify the message from A. CA is also responsible to pre distribute and revoke the
key pairs of the nodes. The nodes and the CA together form the PKI, which can
guarantee that no node can forge reports from other nodes.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Advantages:
 System will perform rigorous analysis on the detection rate of our algorithm
and its resistance against collusions.
 RLNC has extensive applications in wireless network field as it improves the
throughput and utilization of the information capacity greatly.

More Related Content

PDF
Wormhole attack detection algorithms in wireless network coding systems
PDF
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
PDF
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
PPTX
Blackhole Attck detection in AODV Protocol
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
PDF
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
PDF
“Reducing packet loss in manet”
Wormhole attack detection algorithms in wireless network coding systems
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
Blackhole Attck detection in AODV Protocol
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
“Reducing packet loss in manet”

What's hot (20)

PDF
B43011014
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
I1802046780
PDF
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
PDF
Performance Evaluation of Wormhole Attack In AODV
PDF
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
PPTX
NetSim Webinar on Network Attacks and Detection
PPTX
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
PPT
Wireless sensor networks
PDF
Detection and prevention of wormhole attack in mobile adhoc networks
PDF
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
DOC
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
PDF
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
PDF
AODV protocol and Black Hole attack
PPTX
A survey on complex wormhole attack in wireless
PDF
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
PDF
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
PDF
Secure data dissemination protocol in wireless sensor networks using xor netw...
PDF
Efficient distributed detection of node replication attacks in mobile sensor ...
PDF
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
B43011014
International Journal of Computational Engineering Research(IJCER)
I1802046780
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Performance Evaluation of Wormhole Attack In AODV
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
NetSim Webinar on Network Attacks and Detection
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Wireless sensor networks
Detection and prevention of wormhole attack in mobile adhoc networks
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
AODV protocol and Black Hole attack
A survey on complex wormhole attack in wireless
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
Secure data dissemination protocol in wireless sensor networks using xor netw...
Efficient distributed detection of node replication attacks in mobile sensor ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Ad

Viewers also liked (14)

PDF
Ahmad Reza Khawar - Mid-term DI
PPTX
RecargaYA
PDF
Synchro Project Presentation_Rt 322
PDF
Flyer Mindfulness
DOCX
Mu0015 compensation and benefits
PDF
Wissen Products catalouge
DOCX
Pm0016 project risk management
PDF
MT_CV&Port_jun2016
DOCX
Om0011 enterprises resource planning
PPTX
Cf bclic
PPTX
Trabajo Practico Instituciones
PDF
Wessex AHSN stakeholder survey - full report
PPTX
Twinspace for Young Tourism
DOCX
ijazahmadCv
Ahmad Reza Khawar - Mid-term DI
RecargaYA
Synchro Project Presentation_Rt 322
Flyer Mindfulness
Mu0015 compensation and benefits
Wissen Products catalouge
Pm0016 project risk management
MT_CV&Port_jun2016
Om0011 enterprises resource planning
Cf bclic
Trabajo Practico Instituciones
Wessex AHSN stakeholder survey - full report
Twinspace for Young Tourism
ijazahmadCv
Ad

Similar to Wormhole attack detection algorithms (20)

PDF
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
PDF
Identity based encryption
PDF
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
PDF
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
PDF
BDCAM: big data for context-aware Monitoring
PDF
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
PDF
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
PDF
Privacy preserving public auditing for regenerating code based cloud storage
DOCX
Assurance of security and privacy requirements for cloud deployment model
PDF
MohamedMustafa
DOCX
Kariem ali mohamed
PDF
Abdelrahman_Elskhawy
PDF
Abdelrahman_Elskhawy
DOC
Origin proposal for on campus training
PPT
N C C T Embedded Projects Intro & Presentation
PDF
Updated CV
PDF
Curriculum Vitae
DOCX
About company
PDF
Ahmed Maged Resume
DOC
Amit Dixit Resume 1
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Identity based encryption
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCAM: big data for context-aware Monitoring
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Privacy preserving public auditing for regenerating code based cloud storage
Assurance of security and privacy requirements for cloud deployment model
MohamedMustafa
Kariem ali mohamed
Abdelrahman_Elskhawy
Abdelrahman_Elskhawy
Origin proposal for on campus training
N C C T Embedded Projects Intro & Presentation
Updated CV
Curriculum Vitae
About company
Ahmed Maged Resume
Amit Dixit Resume 1

Recently uploaded (20)

PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
01-Introduction-to-Information-Management.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
RMMM.pdf make it easy to upload and study
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Pre independence Education in Inndia.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
01-Introduction-to-Information-Management.pdf
VCE English Exam - Section C Student Revision Booklet
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
human mycosis Human fungal infections are called human mycosis..pptx
Basic Mud Logging Guide for educational purpose
RMMM.pdf make it easy to upload and study
Final Presentation General Medicine 03-08-2024.pptx
Insiders guide to clinical Medicine.pdf
Cell Types and Its function , kingdom of life
Supply Chain Operations Speaking Notes -ICLT Program
O7-L3 Supply Chain Operations - ICLT Program
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Cell Structure & Organelles in detailed.
Sports Quiz easy sports quiz sports quiz
GDM (1) (1).pptx small presentation for students
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Pre independence Education in Inndia.pdf

Wormhole attack detection algorithms

  • 1. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Abstract: Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that of wormhole attacks, which undermines the performance gain of network coding. Since the underlying characteristics of network coding systems are distinctly different from traditional wireless networks, the impact of wormhole attacks and countermeasures are generally unknown. In this paper, we quantify wormholes’ devastating harmful impact on network coding system performance through experiments. We first propose a centralized algorithm to detect wormholes and show its correctness rigorously. For the distributed wireless network, we proposes DAWN, Distributed detection Algorithm against Wormhole in wireless Network coding systems, by exploring the change of the flow directions of the innovative packets caused by wormholes. We rigorously prove that DAWN guarantees a good lower bound of successful detection rate. We perform analysis on the resistance of DAWN against collusion attacks.
  • 2. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Introduction: In wireless network coding systems, the forwarders are allowed to apply encoding schemes on what they receive, and thus they create and transmit new packets. The idea of mixing packets on each node takes good advantages of the opportunity diversity and broadcast nature of wireless communications, and significantly enhances system performance. Wireless network coding systems face new challenges and attacks, whose impact and countermeasures are still not well understood because their underlying characteristics are different from well-studied traditional wireless networks. The wormhole attack is one of these attacks. In a wormhole attack, the attacker can forward each packet using wormhole links and without modifies the packet transmission by routing it to an unauthorized remote node. Hence, receiving the rebroadcast packets by the attackers, some nodes will have the illusion that they are close to the attacker.
  • 3. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Existing System: Wireless network coding systems the routing and packet forwarding procedures are different from those in traditional wireless networks wormhole attacks severely imperil network coding protocols. In particular, if wormhole attacks are launched in routing, the nodes close to attackers will receive more packets than they should and be considered as having a good capability in help forwarding packets. Thus they will be assigned with more responsibility in packet forwarding than what they can actually provide. Furthermore, other nodes will be correspondingly contributing less. This unfair distribution of workload will result in inefficient resource utilization and reduce system performance. Wormhole attacks launched during the data transmission phase can also be very harmful. First, wormhole attacks can be used as the first step towards more sophisticated attacks, such as man-in-the-middle attacks and entropy attacks. Disadvantages:  Wormhole attacks launched during the data transmission phase can also be very harmful.  Retransmitting the packets from the wormhole links, some victim nodes will have to process much more non-innovative packets that will waste their resources; these constitute entropy attacks.
  • 4. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Proposed System: A wireless network design with a set of homogeneous nodes running through network coding protocols, Nodes are connected via lossy wireless links. In wormhole attacks, the attackers between distant locations transmit packets using an out-of-band tunnel. The transmission tunnel is called a wormhole link. The packet loss rate on the wormhole link is negligible. The kinds of the wormhole links can be various, such as an Ethernet cable, an optical link, or a secured long- range wireless transmission. In the wireless network systems, we consider that public key infrastructure (PKI) is in place to implement the public key cryptographic techniques. For the wireless network, we regard each node1 as a user who has a pair of public and private keys. The identity and the public key of each user are managed by the certificate authority (CA), which is a trusted entity. If any node A wants to safely communicate with node B, A has to request B’s public key from the CA first. After the transmission, node B has to request A’s public key from the CA in order to verify the message from A. CA is also responsible to pre distribute and revoke the key pairs of the nodes. The nodes and the CA together form the PKI, which can guarantee that no node can forge reports from other nodes.
  • 5. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com Advantages:  System will perform rigorous analysis on the detection rate of our algorithm and its resistance against collusions.  RLNC has extensive applications in wireless network field as it improves the throughput and utilization of the information capacity greatly.