Secure Data Transmission on Multiple Paths in Mobile Ad Hoc Networks

  • GeMing Xia
  • ZunGuo Huang
  • ZhiYing Wang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4138)

Abstract

In this paper, a secure data transmission scheme based on multiple paths for mobile ad hoc networks was presented. The scheme focused its attention on privacy and robustness in communication. For privacy, a coding scheme using XOR operation was established to strengthen the data confidentiality so that one can not uncover the information unless he took up all the K paths or special K-1 ones. For robustness, it educed a fault tolerant mode which combines backup with checkout, and planed a prepared distributing algorithm, by them the transmission can tolerate multiple path’s dropping with moderate data redundancy, ideal path utilization, and quick data recovery.

Keywords

Mobile Ad Hoc Networks Data Transmission Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Sesay, S., Yang, Z., He, J.: A Survey on Mobile Ad Hoc WirelessNetwork. Information Technology Journal 3, 168–175 (2004)CrossRefGoogle Scholar
  3. 3.
    Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 2, 38–46 (2004)CrossRefGoogle Scholar
  4. 4.
    Mac Williams, F.J., Sloane, N.J.A.: The Theory of Errorcorrecting Codes. North Holland, Amsterdam (1977)Google Scholar
  5. 5.
    Asokan, N., Ginzboorg, P.: Key agreement in ad hoc networks. Elsevier Computer Communications 23, 1627–1637 (2000)Google Scholar
  6. 6.
    Ayanoglu, E., Chih-Lin, E., Gitlin, R.D., Mazo, J.E.: Diversity Coding for Transparent Self-healing and Fault-tolerant. IEEE Transactions on Communications 11, 1677–1686 (1993)CrossRefGoogle Scholar
  7. 7.
    Bouam, S., Ben-Othman, J.: Data Security in Ad hoc Networks Using Multiple path Routing. In: Proceedings of the 14th IEEE PIMRC 2003, pp. 1331–1335 (2003)Google Scholar
  8. 8.
    Ping, Y., Zhong, Y., Shiyong, Z.: DOS Attack and Defense in Mobile Ad Hoc Networks. Journal of Computer Research and Development 4, 697–704 (2005)Google Scholar
  9. 9.
    Burmester, M., Le, T.: Secure Multiple path Communication in Mobile Ad hoc Networks. In: Proceedings of Int’l Conference on Information Technology: Coding & Computing (2004)Google Scholar
  10. 10.
    Zhou, L., Haas, Z.J.: Securing Ad HocNetworks. IEEE Networks 6, 24–30 (1999)CrossRefGoogle Scholar
  11. 11.
    Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceedings of MobiHOC 2001, Long Beach, CA, USA, vol. 10 (2001)Google Scholar
  12. 12.
    Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc WirelessNetworks.Technical Report #200030, UCLA Computer Science Department (2000)Google Scholar
  13. 13.
    Marina, M., Das, S.: On-demand Multi-path Distance Vector Routing in Ad Hoc Networks. In: Proceedings of the International Conference for Network Procotols, Riverside (November 2001)Google Scholar
  14. 14.
    Jin, H., Hwag, K.: Stripped mirroring RAID architecture. Journal of Systems Architecture 6, 543–550 (2000)CrossRefGoogle Scholar
  15. 15.
    Li, V.O.K., Zhenxin, L.: Ad hoc network routing. In: Proceedings of the 2004 IEEE International Conference on Networking, sensing&Control, Taipei,China (March 2004)Google Scholar
  16. 16.
    Sun, B., Li, L.: A Qos Base MultiCast Routing Protocol in Ad Hoc Networks. Chines Journal of Computers 10, 1402–1407 (2004)MathSciNetGoogle Scholar
  17. 17.
    Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX, January 27-31 (2002)Google Scholar
  18. 18.
    Lee, N.K., Yang, S.B., Lee, K.W.: Efficient parity placement schemes for tolerating up to two disk failures in disk arrays. Journal of Systems Architecture 15, 1383–1402 (2000)CrossRefGoogle Scholar
  19. 19.
    Chun, Y., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol. In: Proceeding of the Mobicom 2002, Atlanda, USA (2002)Google Scholar
  20. 20.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the MOBICOM (2000)Google Scholar
  21. 21.
    Yi, S., Naldurg, P., Kravets, R.: A Security-Aware Routing Protocol for Wireless Ad Hoc Networks. In: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, Long Beach, CA, USA (2001)Google Scholar
  22. 22.
    Zhou, J., Wang, G., Liu, X., Liu, J.: The Study of Graph Decompositions and Placement of Parity and Data to Tolerate Two Failtures in Disk Array: Conditions and Existance. Chinese Journal of Computers 10, 1379–1386 (2003)MathSciNetGoogle Scholar
  23. 23.
    Kong, J.: Anonymous and Untraceable Communications in Mobile Wireless Networks. PhD thesis, University of California, Los Angeles (2004)Google Scholar
  24. 24.
    Amitabh Mishr, A., Nadkarni, K., Patcha, A.: Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications 1, 48–60 (2004)CrossRefGoogle Scholar
  25. 25.
    Wang, L., Shu, Y., Dong, M., Zhang, L., Yang, O.: Adaptive Multiple path Source Routing in Ad Hoc Networks. In: Proceedings of the IEEE ICC 2001, pp. 867–871 (2001)Google Scholar
  26. 26.
    Hu, Y.C., Perrig, A.: A Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy 5(6), 28–39 (2004)Google Scholar
  27. 27.
    De, S., Qiao, C., Wu, H.: Meshed multiple path routing with selective forwarding: an efficient strategy in wireless sensor networks. ELSEVIER Computer Networks 43, 481–497 (2003)CrossRefMATHGoogle Scholar
  28. 28.
    Lee, P.P.C., Vishal, M., Dan, R.: Distributed Algorithms forSeure Multi-path Routing. In: Proceedings of IEEE INFOCOM (March 2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • GeMing Xia
    • 1
  • ZunGuo Huang
    • 1
  • ZhiYing Wang
    • 1
  1. 1.School of Computer ScienceNational University of Defense TechnologyChangSha, HunanChina

Personalised recommendations