Secured Routing With Kronecker Product

Secured Routing With Kronecker Product

Jesh R

27,10 €
IVA incluido
Consulta disponibilidad
Editorial:
Indy Pub
Año de edición:
2024
ISBN:
9798869156785

Selecciona una librería:

  • Donde los libros
  • Librería 7artes
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Secured routing with Kronecker Product is a novel approach that combines the concepts of secure routing protocols and the Kronecker product, a mathematical operation used in linear algebra. This innovative method aims to enhance the security and resilience of routing mechanisms in computer networks. In traditional routing protocols, security vulnerabilities and attacks pose significant risks, potentially leading to unauthorized access, data breaches, or disruptions in network connectivity. Secured routing protocols aim to address these concerns by incorporating cryptographic techniques and authentication mechanisms. The Kronecker product, on the other hand, is a mathematical operation used to combine matrices. In the context of secured routing, the Kronecker product is employed to create a joint topology matrix that represents the interconnections between network nodes. This joint topology matrix captures the relationships and paths between nodes, which are crucial for establishing secure routes. By leveraging the Kronecker product, the secured routing approach introduces an additional layer of security by incorporating the joint topology matrix into the routing protocol. This allows for the detection and prevention of attacks such as node compromise, tampering, or malicious routing information injection. Overall, the combination of secured routing with the Kronecker product offers a promising solution for enhancing the security of routing protocols in computer networks. By integrating cryptographic techniques and the joint topology matrix, this approach strengthens the resilience of network routing, mitigates security threats, and ensures secure and reliable communication within the network infrastructure. 

Artículos relacionados