TY - GEN
T1 - Density-based multipath secure communication over mobile ad hoc networks
AU - Chen, Lei
AU - Lee, Chung Wei
AU - Yeh, Jyh Haw
PY - 2006
Y1 - 2006
N2 - Security is a critical issue in mobile ad hoc networks (MANETs), where mobile nodes communicate with each other over relatively unreliable wireless links with no fixed infrastructure. One example of this occurs on battle fields, where soldiers often wear cameras and wireless mobile devices to send or receive images/video of different angles or locations in order to obtain better observation of the area. Such an environment could be highly insecure since an enemy could place devices to eavesdrop on or compromise the soldier nodes. In this paper, we consider a case where time sensitive multimedia is sent using multiple paths which can make better use of load balancing strategies, increase bandwidth and save node energy. However, an enemy node could listen in on more than one path at the same time, allowing it to collect sufficient shares of an image or video frame to recover the image. Our proposed algorithm is based on a quantitative analysis of security to protect against such multi-path eavesdropping. We prove that our algorithm can achieve better level of security by detouring traffic via paths without or with less vulnerable areas at the same amount of redundancy. On the other hand, we also prove, using simulation results and mathematical derivation, our algorithm can provide much more redundancy for better multimedia quality purpose while at the same time guaranteeing the same level of security.
AB - Security is a critical issue in mobile ad hoc networks (MANETs), where mobile nodes communicate with each other over relatively unreliable wireless links with no fixed infrastructure. One example of this occurs on battle fields, where soldiers often wear cameras and wireless mobile devices to send or receive images/video of different angles or locations in order to obtain better observation of the area. Such an environment could be highly insecure since an enemy could place devices to eavesdrop on or compromise the soldier nodes. In this paper, we consider a case where time sensitive multimedia is sent using multiple paths which can make better use of load balancing strategies, increase bandwidth and save node energy. However, an enemy node could listen in on more than one path at the same time, allowing it to collect sufficient shares of an image or video frame to recover the image. Our proposed algorithm is based on a quantitative analysis of security to protect against such multi-path eavesdropping. We prove that our algorithm can achieve better level of security by detouring traffic via paths without or with less vulnerable areas at the same amount of redundancy. On the other hand, we also prove, using simulation results and mathematical derivation, our algorithm can provide much more redundancy for better multimedia quality purpose while at the same time guaranteeing the same level of security.
KW - Ad hoc networks
KW - Multipath routing
KW - Network security
UR - http://www.scopus.com/inward/record.url?scp=34248372444&partnerID=8YFLogxK
U2 - 10.1145/1185448.1185473
DO - 10.1145/1185448.1185473
M3 - Conference contribution
AN - SCOPUS:34248372444
SN - 1595933158
SN - 9781595933157
T3 - Proceedings of the Annual Southeast Conference
SP - 107
EP - 112
BT - Proceedings of the 44th ACM Southeast Conference, ACMSE 2006
T2 - 44th Annual ACM Southeast Conference, ACMSE 2006
Y2 - 10 March 2006 through 12 March 2006
ER -