Privacy and Reliability by Dispersive Routing

نویسندگان

  • Haim Zlatokrilov
  • Hanoch Levy
چکیده

The traditional single (shortest) path routing paradigm leaves sessions vulnerable to a variety of security threats, especially eavesdropping. We propose to overcome this via dispersive routing, conducted over multiple paths. This increases significantly the costs inflicted on an attacker who wishes to eavesdrop or conduct DoS attack on network sessions by hijacking network links (or routers)1.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data

To analyze the privacy and reliability of Ad Hoc Network-based algorithms used in agricultural wireless data transmission, the paper introduces the routing protocols including DSDV, AODV and DSR, based on which a farmland model is built to simulate the speed and density of mobile node, and regards the success rate of data transmission (R/S Rate), average latency of end-to-end (E2E Delay) and av...

متن کامل

A New Framework for Secure Routing in VANET

Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...

متن کامل

Reliability and Performance Evaluation of Fault-aware Routing Methods for Network-on-Chip Architectures (RESEARCH NOTE)

Nowadays, faults and failures are increasing especially in complex systems such as Network-on-Chip (NoC) based Systems-on-a-Chip due to the increasing susceptibility and decreasing feature sizes. On the other hand, fault-tolerant routing algorithms have an evident effect on tolerating permanent faults and improving the reliability of a Network-on-Chip based system. This paper presents reliabili...

متن کامل

Cloud Computing: Architectural and Policy Implications

Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing k...

متن کامل

Introduction to advances in trust, security, and privacy for wireless networks

In recent years, wireless networks have become one of the most influential technological accomplishments and pervaded our daily lives in forms of mobile telephony and wireless computing. Due to their rapid development and widespread applications, trust, security, and privacy issues in wireless networks have become very important topics. As a result, there is a grand challenge to build wireless ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005