Skip to main content

Secure Data Transmission on Multiple Paths in Mobile Ad Hoc Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 4138))

Abstract

In this paper, a secure data transmission scheme based on multiple paths for mobile ad hoc networks was presented. The scheme focused its attention on privacy and robustness in communication. For privacy, a coding scheme using XOR operation was established to strengthen the data confidentiality so that one can not uncover the information unless he took up all the K paths or special K-1 ones. For robustness, it educed a fault tolerant mode which combines backup with checkout, and planed a prepared distributing algorithm, by them the transmission can tolerate multiple path’s dropping with moderate data redundancy, ideal path utilization, and quick data recovery.

This research is supported by National 863 Program (Grant No. 2003AA142080).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mobile Adhoc Networks (May 2000), http://www.ietf.org/html.charters/manet-charter.html

  2. Sesay, S., Yang, Z., He, J.: A Survey on Mobile Ad Hoc WirelessNetwork. Information Technology Journal 3, 168–175 (2004)

    Article  Google Scholar 

  3. Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 2, 38–46 (2004)

    Article  Google Scholar 

  4. Mac Williams, F.J., Sloane, N.J.A.: The Theory of Errorcorrecting Codes. North Holland, Amsterdam (1977)

    Google Scholar 

  5. Asokan, N., Ginzboorg, P.: Key agreement in ad hoc networks. Elsevier Computer Communications 23, 1627–1637 (2000)

    Google Scholar 

  6. Ayanoglu, E., Chih-Lin, E., Gitlin, R.D., Mazo, J.E.: Diversity Coding for Transparent Self-healing and Fault-tolerant. IEEE Transactions on Communications 11, 1677–1686 (1993)

    Article  Google Scholar 

  7. Bouam, S., Ben-Othman, J.: Data Security in Ad hoc Networks Using Multiple path Routing. In: Proceedings of the 14th IEEE PIMRC 2003, pp. 1331–1335 (2003)

    Google Scholar 

  8. Ping, Y., Zhong, Y., Shiyong, Z.: DOS Attack and Defense in Mobile Ad Hoc Networks. Journal of Computer Research and Development 4, 697–704 (2005)

    Google Scholar 

  9. Burmester, M., Le, T.: Secure Multiple path Communication in Mobile Ad hoc Networks. In: Proceedings of Int’l Conference on Information Technology: Coding & Computing (2004)

    Google Scholar 

  10. Zhou, L., Haas, Z.J.: Securing Ad HocNetworks. IEEE Networks 6, 24–30 (1999)

    Article  Google Scholar 

  11. Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of MobiHOC 2001, Long Beach, CA, USA, vol. 10 (2001)

    Google Scholar 

  12. Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc WirelessNetworks.Technical Report #200030, UCLA Computer Science Department (2000)

    Google Scholar 

  13. Marina, M., Das, S.: On-demand Multi-path Distance Vector Routing in Ad Hoc Networks. In: Proceedings of the International Conference for Network Procotols, Riverside (November 2001)

    Google Scholar 

  14. Jin, H., Hwag, K.: Stripped mirroring RAID architecture. Journal of Systems Architecture 6, 543–550 (2000)

    Article  Google Scholar 

  15. Li, V.O.K., Zhenxin, L.: Ad hoc network routing. In: Proceedings of the 2004 IEEE International Conference on Networking, sensing&Control, Taipei,China (March 2004)

    Google Scholar 

  16. Sun, B., Li, L.: A Qos Base MultiCast Routing Protocol in Ad Hoc Networks. Chines Journal of Computers 10, 1402–1407 (2004)

    MathSciNet  Google Scholar 

  17. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX, January 27-31 (2002)

    Google Scholar 

  18. Lee, N.K., Yang, S.B., Lee, K.W.: Efficient parity placement schemes for tolerating up to two disk failures in disk arrays. Journal of Systems Architecture 15, 1383–1402 (2000)

    Article  Google Scholar 

  19. Chun, Y., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol. In: Proceeding of the Mobicom 2002, Atlanda, USA (2002)

    Google Scholar 

  20. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the MOBICOM (2000)

    Google Scholar 

  21. Yi, S., Naldurg, P., Kravets, R.: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, Long Beach, CA, USA (2001)

    Google Scholar 

  22. Zhou, J., Wang, G., Liu, X., Liu, J.: The Study of Graph Decompositions and Placement of Parity and Data to Tolerate Two Failtures in Disk Array: Conditions and Existance. Chinese Journal of Computers 10, 1379–1386 (2003)

    MathSciNet  Google Scholar 

  23. Kong, J.: Anonymous and Untraceable Communications in Mobile Wireless Networks. PhD thesis, University of California, Los Angeles (2004)

    Google Scholar 

  24. Amitabh Mishr, A., Nadkarni, K., Patcha, A.: Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications 1, 48–60 (2004)

    Article  Google Scholar 

  25. Wang, L., Shu, Y., Dong, M., Zhang, L., Yang, O.: Adaptive Multiple path Source Routing in Ad Hoc Networks. In: Proceedings of the IEEE ICC 2001, pp. 867–871 (2001)

    Google Scholar 

  26. Hu, Y.C., Perrig, A.: A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy 5(6), 28–39 (2004)

    Google Scholar 

  27. De, S., Qiao, C., Wu, H.: Meshed multiple path routing with selective forwarding: an efficient strategy in wireless sensor networks. ELSEVIER Computer Networks 43, 481–497 (2003)

    Article  MATH  Google Scholar 

  28. Lee, P.P.C., Vishal, M., Dan, R.: Distributed Algorithms forSeure Multi-path Routing. In: Proceedings of IEEE INFOCOM (March 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xia, G., Huang, Z., Wang, Z. (2006). Secure Data Transmission on Multiple Paths in Mobile Ad Hoc Networks. In: Cheng, X., Li, W., Znati, T. (eds) Wireless Algorithms, Systems, and Applications. WASA 2006. Lecture Notes in Computer Science, vol 4138. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11814856_41

Download citation

  • DOI: https://doi.org/10.1007/11814856_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37189-2

  • Online ISBN: 978-3-540-37190-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics