SPREAD: enhancing data confidentiality in mobile ad hoc networks
- 1 January 2004
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 4, 2404-2413 vol.4
- https://doi.org/10.1109/infcom.2004.1354662
Abstract
Security is a critical issue in a mobile ad hoc network (MANET). We propose and investigate a novel scheme, security protocol for reliable data delivery (SPREAD), to enhance the data confidentiality service in a mobile ad hoc network. The proposed SPREAD scheme aims to provide further protection to secret messages from being compromised (or eavesdropped) when they are delivered across the insecure network. The basic idea is to transform a secret message into multiple shares by secret sharing schemes and then deliver the shares via multiple independent paths to the destination so that even if a small number of nodes that are used to relay the message shares are compromised, the secret message as a whole is not compromised. We present the overall system architecture and investigate the major design issues. We first describe how to obtain message shares using the secret sharing schemes. Then we study the appropriate choice of the secret sharing schemes and the optimal allocation of the message shares onto each path in order to maximize the security. The results show that the SPREAD is more secure and also provides a certain degree of reliability without sacrificing the security. Thirdly, the multipath routing techniques are discussed and the path set optimization algorithm is developed to find the multiple paths with the desired property, i.e., the overall path set providing maximum security. Finally, we present the simulation results to justify the feasibility and evaluate the effectiveness of SPREAD.Keywords
This publication has 18 references indexed in Scilit:
- Intrusion Detection Techniques for Mobile Wireless NetworksWireless Networks, 2003
- Preventing traffic analysis in packet radio networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Split multipath routing with maximally disjoint paths in ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On the impact of alternate path routing for load balancing in mobile ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Performance analysis of the CONFIDANT protocolPublished by Association for Computing Machinery (ACM) ,2002
- Predictive Caching Strategy for On-Demand Routing Protocols in Wireless Ad Hoc NetworksWireless Networks, 2002
- Multipath routing in the presence of frequent topological changesIEEE Communications Magazine, 2001
- Intercepting mobile communicationsPublished by Association for Computing Machinery (ACM) ,2001
- Cheating detection and cheater identification in secret sharing schemesIEE Proceedings - Computers and Digital Techniques, 1995
- How to share a secretCommunications of the ACM, 1979