Abstract
In this paper, a secure data transmission scheme based on multiple paths for mobile ad hoc networks was presented. The scheme focused its attention on privacy and robustness in communication. For privacy, a coding scheme using XOR operation was established to strengthen the data confidentiality so that one can not uncover the information unless he took up all the K paths or special K-1 ones. For robustness, it educed a fault tolerant mode which combines backup with checkout, and planed a prepared distributing algorithm, by them the transmission can tolerate multiple path’s dropping with moderate data redundancy, ideal path utilization, and quick data recovery.
This research is supported by National 863 Program (Grant No. 2003AA142080).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Mobile Adhoc Networks (May 2000), http://www.ietf.org/html.charters/manet-charter.html
Sesay, S., Yang, Z., He, J.: A Survey on Mobile Ad Hoc WirelessNetwork. Information Technology Journal 3, 168–175 (2004)
Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 2, 38–46 (2004)
Mac Williams, F.J., Sloane, N.J.A.: The Theory of Errorcorrecting Codes. North Holland, Amsterdam (1977)
Asokan, N., Ginzboorg, P.: Key agreement in ad hoc networks. Elsevier Computer Communications 23, 1627–1637 (2000)
Ayanoglu, E., Chih-Lin, E., Gitlin, R.D., Mazo, J.E.: Diversity Coding for Transparent Self-healing and Fault-tolerant. IEEE Transactions on Communications 11, 1677–1686 (1993)
Bouam, S., Ben-Othman, J.: Data Security in Ad hoc Networks Using Multiple path Routing. In: Proceedings of the 14th IEEE PIMRC 2003, pp. 1331–1335 (2003)
Ping, Y., Zhong, Y., Shiyong, Z.: DOS Attack and Defense in Mobile Ad Hoc Networks. Journal of Computer Research and Development 4, 697–704 (2005)
Burmester, M., Le, T.: Secure Multiple path Communication in Mobile Ad hoc Networks. In: Proceedings of Int’l Conference on Information Technology: Coding & Computing (2004)
Zhou, L., Haas, Z.J.: Securing Ad HocNetworks. IEEE Networks 6, 24–30 (1999)
Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of MobiHOC 2001, Long Beach, CA, USA, vol. 10 (2001)
Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc WirelessNetworks.Technical Report #200030, UCLA Computer Science Department (2000)
Marina, M., Das, S.: On-demand Multi-path Distance Vector Routing in Ad Hoc Networks. In: Proceedings of the International Conference for Network Procotols, Riverside (November 2001)
Jin, H., Hwag, K.: Stripped mirroring RAID architecture. Journal of Systems Architecture 6, 543–550 (2000)
Li, V.O.K., Zhenxin, L.: Ad hoc network routing. In: Proceedings of the 2004 IEEE International Conference on Networking, sensing&Control, Taipei,China (March 2004)
Sun, B., Li, L.: A Qos Base MultiCast Routing Protocol in Ad Hoc Networks. Chines Journal of Computers 10, 1402–1407 (2004)
Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX, January 27-31 (2002)
Lee, N.K., Yang, S.B., Lee, K.W.: Efficient parity placement schemes for tolerating up to two disk failures in disk arrays. Journal of Systems Architecture 15, 1383–1402 (2000)
Chun, Y., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol. In: Proceeding of the Mobicom 2002, Atlanda, USA (2002)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the MOBICOM (2000)
Yi, S., Naldurg, P., Kravets, R.: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, Long Beach, CA, USA (2001)
Zhou, J., Wang, G., Liu, X., Liu, J.: The Study of Graph Decompositions and Placement of Parity and Data to Tolerate Two Failtures in Disk Array: Conditions and Existance. Chinese Journal of Computers 10, 1379–1386 (2003)
Kong, J.: Anonymous and Untraceable Communications in Mobile Wireless Networks. PhD thesis, University of California, Los Angeles (2004)
Amitabh Mishr, A., Nadkarni, K., Patcha, A.: Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications 1, 48–60 (2004)
Wang, L., Shu, Y., Dong, M., Zhang, L., Yang, O.: Adaptive Multiple path Source Routing in Ad Hoc Networks. In: Proceedings of the IEEE ICC 2001, pp. 867–871 (2001)
Hu, Y.C., Perrig, A.: A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy 5(6), 28–39 (2004)
De, S., Qiao, C., Wu, H.: Meshed multiple path routing with selective forwarding: an efficient strategy in wireless sensor networks. ELSEVIER Computer Networks 43, 481–497 (2003)
Lee, P.P.C., Vishal, M., Dan, R.: Distributed Algorithms forSeure Multi-path Routing. In: Proceedings of IEEE INFOCOM (March 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xia, G., Huang, Z., Wang, Z. (2006). Secure Data Transmission on Multiple Paths in Mobile Ad Hoc Networks. In: Cheng, X., Li, W., Znati, T. (eds) Wireless Algorithms, Systems, and Applications. WASA 2006. Lecture Notes in Computer Science, vol 4138. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11814856_41
Download citation
DOI: https://doi.org/10.1007/11814856_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37189-2
Online ISBN: 978-3-540-37190-8
eBook Packages: Computer ScienceComputer Science (R0)