Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks

A multi-hop wireless network with highly dynamic members and mobility is vulnerable to many attacks. To address this problem, we propose a novel time-based approach that exploits mobility. In our scheme, the source sends shares at different times. Due to node mobility, these shares will be routed through different intermediate nodes. It is highly unlikely that a particular intermediate node is able to be on many of these routes and to collect enough shares to reconstruct the original message. The scheme is particularly suitable for applications that can tolerate long message delays, as studied in Delay Tolerant Networks. The article focuses on analyzing the feasibility of this scheme. We describe a general approach to calculate the probability of intercepting enough shares by arbitrary nodes, together with simulations. The results show that the probability is small. The scheme provides a valuable alternative for delay tolerant applications to enhance message confidentiality.

[1]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[3]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[4]  Yuguang Fang,et al.  Modeling Secure Connectivity of Self-Organized Wireless Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[5]  R. Radhakrishnan,et al.  Simple Interference Cancellation Technique for Multicarrier DS-CDMA , 2007, Int. J. Bus. Data Commun. Netw..

[6]  Mingyan Liu,et al.  Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  Flávio Henrique Teles Vieira,et al.  Providing Quality of Service to Computer Networks through Traffic Modeling : Improving the Estimation of Bandwidth and Data Loss Probability , 2010 .

[8]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[9]  Christos Gkantsidis,et al.  An Optimization Framework for Opportunistic Multipath Routing in Wireless Mesh Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[10]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[11]  Pattarasinee Bhattarakosol Intelligent Quality of Service Technologies and Network Management: Models for Enhancing Communication , 2010 .

[12]  Rainer Leupers,et al.  Automatic Generation of Memory Interfaces for ASIPs , 2010, Int. J. Embed. Real Time Commun. Syst..

[13]  Janelle J. Harms,et al.  Performance study of a multipath routing method for wireless mobile ad hoc networks , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[15]  Tibor Dulai,et al.  Advanced Communication Protocol Technologies: Solutions, Methods, and Applications , 2011 .

[16]  Phan Cong-vinh Formal and Practical Aspects of Autonomic Computing and Networking: Specification, Development, and Verification , 2011 .

[17]  Sung-Ju Lee,et al.  Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[18]  Donald E. Knuth,et al.  The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .

[19]  Yuguang Fang,et al.  SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[20]  P. M. Lee,et al.  Random Walks and Random Environments: Volume 1: Random Walks , 1995 .

[21]  Rabin K. Patra,et al.  Routing in a delay tolerant network , 2004, SIGCOMM '04.

[22]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[23]  Panagiotis Papadimitratos,et al.  Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.

[24]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[25]  Zygmunt J. Haas,et al.  Multipath routing in the presence of frequent topological changes , 2001, IEEE Commun. Mag..

[26]  Rainer Leupers,et al.  Optimized Communication Architecture of MPSoCs with a Hardware Scheduler: A System-Level Analysis , 2011, Int. J. Embed. Real Time Commun. Syst..

[27]  Chung-ming Huang,et al.  Telematics Communication Technologies and Vehicular Networks: Wireless Architectures and Applications , 2009 .

[28]  Kalle Lyytinen,et al.  Telecommunications in transition: the Chinese experience in the international context , 2001 .

[29]  Huaqun Guo Automotive Informatics and Communicative Systems: Principles in Vehicular Networks and Data Exchange , 2009 .

[30]  Say Ying Lim,et al.  Mobile Division Query Processing Incorporating Multiple Non-Collaborative Servers , 2009, Int. J. Bus. Data Commun. Netw..

[31]  Fred B. Schneider,et al.  COCA: a secure distributed online certification authority , 2002 .

[32]  Samir Chatterjee,et al.  International Journal of Business Data Communications and Networking , 2010 .

[33]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[34]  Yogesk K. Dwivedi,et al.  Reflecting Upon the Empirical Findings: Validating the Conceptual Model , 2008 .

[35]  Ramesh Subramanian,et al.  Peer to Peer Computing: The Evolution of a Disruptive Technology , 2005 .

[36]  Beomjin Choi,et al.  Building Enterprise Network Infrastructure for a Supermarket Store Chain , 2009, J. Cases Inf. Technol..

[37]  Haiyun Luo,et al.  URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.

[38]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[39]  R. Durrett Random walks and random environments. Volume 1: Random walks , 1996 .

[40]  Stavros Kotsopoulos,et al.  Handbook of Research on Heterogeneous Next Generation Networking: Innovations and Platforms , 2008 .

[41]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[42]  Tomasz Imielinski,et al.  Mobile Computing , 1996 .

[43]  Teng-Wen Chang,et al.  Vehicular System Management Architecture and Application Platform , 2010 .

[44]  Anthony Ioannidis,et al.  Converged Networks and Seamless Mobility: Lessons from Experience , 2009 .

[45]  Li-Te Cheng,et al.  Personal Peer-to-Peer Collaboration Based on Shared Objects , 2005 .