Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
Communications of the ACM
Something About All or Nothing (Transforms)
Designs, Codes and Cryptography
All-or-Nothing Encryption and the Package Transform
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
MAR: a commuter router infrastructure for the mobile Internet
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Why cell phones will dominate the future internet
ACM SIGCOMM Computer Communication Review
The Final Nail in WEP's Coffin
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Information slicing: anonymity using unreliable overlays
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
On a special class of broadcast channels with confidential messages
IEEE Transactions on Information Theory
On information transmission over a finite buffer channel
IEEE Transactions on Information Theory
On Lower Bounds for the Capacity of Deletion Channels
IEEE Transactions on Information Theory
A Simple Lower Bound for the Capacity of the Deletion Channel
IEEE Transactions on Information Theory
Applications of LDPC Codes to the Wiretap Channel
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Data confidentiality over mobile devices can be difficult to secure due to a lack of computing power and weak supporting encryption components. However, modern devices often have multiple wireless interfaces with diverse channel capacities and security capabilities. We show that the availability of diverse, heterogeneous links (physical or logical) between nodes in a network can be used to increase data confidentiality, on top of the availability or strength of underlying encryption techniques. We introduce a new security approach using multiple channels to transmit data securely, based on the idea of deliberate corruption, and information reduction, and analyze its security using the information theoretic concept of secrecy capacity, and the wiretap channel. Our work introduces the idea of channel design with security in mind.