Finite fields
GloMoSim: a library for parallel simulation of large-scale wireless networks
PADS '98 Proceedings of the twelfth workshop on Parallel and distributed simulation
Performance of multipath routing for on-demand protocols in mobile ad hoc networks
Mobile Networks and Applications
Location-based localized alternate, disjoint and multi-path routing algorithms for wireless networks
Journal of Parallel and Distributed Computing - Special issue on wireless and mobile ad hoc networking and computing
Optimal Multi-Path End-to-End Data Transmission in Networks
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
MP-DSR: A QoS-Aware Multi-Path Dynamic Source Routing Protocol for Wireless Ad-Hoc Networks
LCN '01 Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
On-Demand Multi Path Distance Vector Routing in Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
MASCOTS '01 Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Reliable Multipath Routing with Fixed Delays in MANET Using Regenerating Nodes
LCN '03 Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks
On-demand QoS multipath routing
ICCS '02 Proceedings of the The 8th International Conference on Communication Systems - Volume 01
Analysis of multipath Routing-Part I: the effect on the packet delivery ratio
IEEE Transactions on Wireless Communications
Multipath routing in the presence of frequent topological changes
IEEE Communications Magazine
Hi-index | 0.00 |
In this paper, we present MuSeQoR: a new multi-path routing protocol that tackles the twin issues of reliability (protection against failures of multiple paths) and security, while ensuring minimum data redundancy. Unlike in all the previous studies, reliability is addressed in the context of both erasure and corruption channels. We also quantify the security of the protocol in terms of the number of eavesdropping nodes. The reliability and security requirements of a session are specified by a user and are related to the parameters of the protocol adaptively. This relationship is of central importance and shows how the protocol attempts to simultaneously achieve reliability and security. In addition, by using optimal coding schemes and by dispersing the original data, we minimize the redundancy. Finally, extensive simulations were performed to assess the performance of the protocol under varying network conditions. The simulation studies clearly indicate the gains in using such a protocol and also highlight the enormous flexibility of the protocol.