Stripped mirroring RAID architecture
Journal of Systems Architecture: the EUROMICRO Journal
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Efficient parity placement schemes for tolerating up to two disk failures in disk arrays
Journal of Systems Architecture: the EUROMICRO Journal
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
On-Demand Multi Path Distance Vector Routing in Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Wireless sensor networks
Secure Multipath Communication in Mobile Ad hoc Networks
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Anonymous and untraceable communications in mobile wireless networks
Anonymous and untraceable communications in mobile wireless networks
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Key agreement in ad hoc networks
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In this paper, a secure data transmission scheme based on multiple paths for mobile ad hoc networks was presented. The scheme focused its attention on privacy and robustness in communication. For privacy, a coding scheme using XOR operation was established to strengthen the data confidentiality so that one can not uncover the information unless he took up all the K paths or special K-1 ones. For robustness, it educed a fault tolerant mode which combines backup with checkout, and planed a prepared distributing algorithm, by them the transmission can tolerate multiple path's dropping with moderate data redundancy, ideal path utilization, and quick data recovery.