Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Communications of the ACM
On the impact of alternate path routing for load balancing in mobile ad hoc networks
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
PKI: It's Not Dead, Just Resting
Computer
All-or-Nothing Encryption and the Package Transform
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Proceedings of the 2008 ACM symposium on Information, computer and communications security
New directions in cryptography
IEEE Transactions on Information Theory
Key agreement in ad hoc networks
Computer Communications
Secure data communication in mobile ad hoc networks
IEEE Journal on Selected Areas in Communications
Network coding based reliable disjoint and braided multipath routing for sensor networks
Journal of Network and Computer Applications
Shortest hop multipath algorithm for wireless sensor networks
Computers & Mathematics with Applications
Hi-index | 0.00 |
An ad hoc network is a self-organizing network of wireless links connecting mobile nodes. The mobile nodes can communicate without an infrastructure. They form an arbitrary topology, where the nodes play the role of routers and are free to move randomly. Ad hoc networks proved their efficiency being used in different fields but they are highly vulnerable to security attacks and dealing with this is one of the main challenges of these networks today. Recently, some solutions are proposed to provide authentication, confidentiality, availability, secure routing and intrusion detection in ad hoc networks. Implementing security in such dynamically changing networks is a hard task. Ad hoc network characteristics should be taken into consideration to be able to design efficient solutions. In this study, we focus on improving the flow transmission confidentiality in ad hoc networks based on multipath routing. Indeed, we take advantage of the existence of multiple paths between nodes in an ad hoc network to increase the confidentiality robustness of transmitted data. In our approach the original message to secure is split into shares that are encrypted and combined then transmitted along different disjointed existing paths between sender and receiver. Even if an attacker succeeds to obtain one or more transmitted shares, the probability that the original message will be reconstituted is very low. We compare our approach with existing ad hoc multipath security solutions and present performance evaluations of our protocol SDMP (Securing Data based Multipath Routing).