By Topic

Strategies for time-based multi-path secure information disseminations in MANETs

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Xiaoyan Hong ; Dept. of Comput. Sci., Univ. of Alabama, Tuscaloosa, AL ; Bo Gu ; Qunwei Zheng

Sending messages securely to protect confidentiality in mobile ad hoc networks is a challenging issue due to the open wireless media, the spacial constraints and the difficulty in establishing strict security mechanisms. To tackle the problem, we have presented a scheme where a source node sends shares of a message at different times. Due to node mobility, the shares will be routed through different intermediate nodes. It is highly unlikely that a particular intermediate node (an eavesdropper) is able to be on (or around) many of these routes and collect enough shares to reconstruct the original message. The scheme is particular suitable for applications that can tolerate long message delays, as those studied in delay tolerant networks. The paper focuses on analyzing the strategies that a node can use in determining the intervals between two shares, and in tuning to applicationspsila requirements on delay bounds. The results provide a guideline for the configuration and the security of the scheme. We further investigate the influence from various mobility models on the security property. The results show big differences among the models and the practical aspect of the scheme. In all, our proposed scheme provides a valuable alternative for delay tolerant applications to enhance message confidentiality.

Published in:

Military Communications Conference, 2008. MILCOM 2008. IEEE

Date of Conference:

16-19 Nov. 2008