Secure data transmission on multiple paths in mobile ad hoc networks

被引:0
|
作者
Xia, GeMing [1 ]
Huang, ZunGuo [1 ]
Wang, ZhiYing [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp Sci, Changsha, Hunan, Peoples R China
关键词
mobile ad hoc networks; data transmission; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, a secure data transmission scheme based on multiple paths for mobile ad hoc networks was presented. The scheme focused its attention on privacy and robustness in communication. For privacy, a coding scheme using XOR operation was established to strengthen the data confidentiality so that one can not uncover the information unless he took up all the K paths or special K-I ones. For robustness, it educed a fault tolerant mode which combines backup with checkout, and planed a prepared distributing algorithm, by them the transmission can tolerate multiple path's dropping with moderate data redundancy, ideal path utilization, and quick data recovery.
引用
收藏
页码:424 / 434
页数:11
相关论文
共 50 条
  • [31] Secure Key Distribution for Mobile Ad Hoc Networks
    Dawoud, Dawoud S.
    Auxeeliya, Jesudoss
    [J]. IMETI 2010: 3RD INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II (POST-CONFERENCE EDITION), 2010, : 326 - 331
  • [32] Video transmission in mobile ad hoc networks using multiple interfaces and multiple channels
    Bouras, C.
    Gkamas, A.
    Kapoulas, V.
    Politaki, D.
    Tsanai, E.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (08)
  • [33] A graph-based approach to compute multiple paths in mobile ad hoc networks
    Koh, G
    Oh, D
    Woo, H
    [J]. WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 323 - 331
  • [34] On Optimal Video Transmission over Multiple Paths in Wireless Ad-Hoc Networks
    Cikovskis, Lauris
    Slaidins, Ilmars
    Vdovins, Sergejs
    [J]. 2012 20TH TELECOMMUNICATIONS FORUM (TELFOR), 2012, : 319 - 322
  • [35] An Identification based Authentication Protocol for Secure Data Transmission in Ad-Hoc Networks
    Cho, Youngbok
    Ning, Sun
    Lee, Sangho
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2012, 5 (02): : 107 - 120
  • [36] Survey on Secure Routing in Mobile Ad-hoc Networks
    Kannammal, A.
    Roy, S. Sujith
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN MACHINE INTERACTION (HMI), 2016, : 154 - 160
  • [37] SEMAN: A Novel Secure Middleware for Mobile Ad Hoc Networks
    da Silva, Eduardo
    Pessoa Albini, Luiz Carlos
    [J]. JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2016, 2016 (2016)
  • [38] PAYFLUX - Secure electronic payment in mobile ad hoc networks
    Herrmann, K
    Jaeger, MA
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 66 - 78
  • [39] Energy Aware Secure Clustering in Mobile Ad hoc Networks
    Soliman, Khaled
    Sobh, M. A.
    Bahaa-Eldin, Ayman M.
    Hegazi, Emad
    [J]. 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 241 - 246
  • [40] A secure and pragmatic routing protocol for mobile ad hoc networks
    College of Computer, Huangshi Institute of Technology, Huangshi, Hubei 435003, China
    不详
    [J]. J. Donghua Univ, 2008, 1 (11-15):