SPREAD: Improving network security by multipath routing in mobile ad hoc networks

被引:43
作者
Lou, Wenjing [4 ]
Liu, Wei [3 ]
Zhang, Yanchao [2 ]
Fang, Yuguang [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Wireless Networks Lab WINET, Gainesville, FL 32611 USA
[2] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
[3] Scalable Network Technol, Los Angeles, CA 90045 USA
[4] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
基金
美国国家科学基金会;
关键词
Multipath routing; Network security; Ad hoc networks;
D O I
10.1007/s11276-007-0039-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose and investigate the SPREAD scheme as a complementary mechanism to enhance secure data delivery in a mobile ad hoc network. The basic idea is to transform a secret message into multiple shares, and then deliver the shares via multiple paths to the destination so that even if a certain number of message shares are compromised, the secret message as a whole is not compromised. We present the overall system architecture and discuss three major design issues: the mathematical model for the generation and reconstruction of the secret message shares, the optimal allocation of the message shares onto multiple paths in terms of security, and the multipath discovery techniques in a mobile ad hoc network. Our extensive simulation results justify the feasibility and the effectiveness of the SPREAD approach.
引用
收藏
页码:279 / 294
页数:16
相关论文
共 8 条
[1]   An overview of quality of service routing for next-generation high-speed networks: Problems and solutions [J].
Chen, SG ;
Nahrstedt, K .
IEEE NETWORK, 1998, 12 (06) :64-79
[2]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[3]  
Sun YL, 2006, IEEE J SEL AREA COMM, V24, P305, DOI [10.1109/JSAC.2005.0861389, 10.1109/JSAC.2005.861389]
[4]  
Suurballe J. W., 1974, Networks, V4, P125, DOI 10.1002/net.3230040204
[5]   A QUICK METHOD FOR FINDING SHORTEST PAIRS OF DISJOINT PATHS [J].
SUURBALLE, JW ;
TARJAN, RE .
NETWORKS, 1984, 14 (02) :325-336
[6]   Analysis of multipath routing, part 2: Mitigation of the effects of frequently changing network topologies [J].
Tsirigos, A ;
Haas, ZJ .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2004, 3 (02) :500-511
[7]   Analysis of multipath routing - Part I: The effect on the packet delivery ratio [J].
Tsirigos, A ;
Haas, ZJ .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2004, 3 (01) :138-146
[8]   Location-based compromise-tolerant security mechanisms for wireless sensor networks [J].
Zhang, YC ;
Liu, W ;
Lou, WJ ;
Fang, YG .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :247-260