A network security model based on the resource constrained shortest path
A network security model based on the resource constrained shortest path
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
A distributed algorithm for delay-constrained unicast routing
IEEE/ACM Transactions on Networking (TON)
Computer Networking: A Top-Down Approach Featuring the Internet
Computer Networking: A Top-Down Approach Featuring the Internet
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
The Cascade Vulnerability Problem
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
The Complexity and Composability of Secure Interoperation
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Comparison of routing metrics for static multi-hop wireless networks
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Routing in multi-radio, multi-hop wireless mesh networks
Proceedings of the 10th annual international conference on Mobile computing and networking
A high-throughput path metric for multi-hop wireless routing
Wireless Networks - Special issue: Selected papers from ACM MobiCom 2003
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
IEEE Transactions on Computers
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
We investigate the risk associated with multi-hop wireless communications due to eavesdropping. When the same message traverses cross a multihop wireless network, potential security leaks may occur because of intelligent and collaborative eavesdroppers even if all individual links from source to destination have signal leakage below a security threshold. We termed this phenomenon "cumulative security leakage". In this work, we quantify the cumulative security leakage problem in terms of received signal-to-noise ratio (SNR) at the eavesdropper. We propose a cross-layer framework to mitigate such security vulnerability. Our solution involves a novel routing algorithm that uses physical (PHY) layer attributes such as SNR as security metric and is readily applicable in wireless mesh networks.