A simulation study of security performance using multipath routing in ad hoc networks

Wenjing Lou, Wei Liu, Yuguang Fang

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

8 Citations (Scopus)

Abstract

In this paper, we investigate the security performance of the SPREAD scheme, which we proposed as a complementary mechanism to enhance data confidentiality in a mobile ad hoc network (MANET). SPREAD is based on two principles, secret sharing and multipath routing. By a secret sharing scheme, a secret message can be divided into multiple shares; then by multipath routing, the shares can be delivered to the destination via multiple paths. Improved security is expected because an adversary (adversaries) will have more difficulty in collecting enough shares to compromise the secret message. As the broadcast wireless channel of a MANET has a significant impact on the performance of multipath routing, we examine the performance of SPREAD based on the shared single wireless channel model by simulation. Our results show that SPREAD scheme is effective in reducing the message compromising and eavesdropping probability. The impacts of node mobility and different share allocations on the performance of SPREAD are also investigated.
Original languageEnglish
Pages (from-to)2142-2146
JournalIEEE Vehicular Technology Conference
Volume58
Issue number3
DOIs
Publication statusPublished - 2003
Externally publishedYes
Event2003 IEEE 58th Vehicular Technology Conference, VTC2003-Fall - Orlando, FL, United States
Duration: 6 Oct 20039 Oct 2003

Bibliographical note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].

Research Keywords

  • Ad hoc network
  • Multipath routing
  • Security
  • Simulation

Fingerprint

Dive into the research topics of 'A simulation study of security performance using multipath routing in ad hoc networks'. Together they form a unique fingerprint.

Cite this