Privacy and Reliability by Dispersive Routing
نویسندگان
چکیده
The traditional single (shortest) path routing paradigm leaves sessions vulnerable to a variety of security threats, especially eavesdropping. We propose to overcome this via dispersive routing, conducted over multiple paths. This increases significantly the costs inflicted on an attacker who wishes to eavesdrop or conduct DoS attack on network sessions by hijacking network links (or routers)1.
منابع مشابه
Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data
To analyze the privacy and reliability of Ad Hoc Network-based algorithms used in agricultural wireless data transmission, the paper introduces the routing protocols including DSDV, AODV and DSR, based on which a farmland model is built to simulate the speed and density of mobile node, and regards the success rate of data transmission (R/S Rate), average latency of end-to-end (E2E Delay) and av...
متن کاملA New Framework for Secure Routing in VANET
Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...
متن کاملReliability and Performance Evaluation of Fault-aware Routing Methods for Network-on-Chip Architectures (RESEARCH NOTE)
Nowadays, faults and failures are increasing especially in complex systems such as Network-on-Chip (NoC) based Systems-on-a-Chip due to the increasing susceptibility and decreasing feature sizes. On the other hand, fault-tolerant routing algorithms have an evident effect on tolerating permanent faults and improving the reliability of a Network-on-Chip based system. This paper presents reliabili...
متن کاملCloud Computing: Architectural and Policy Implications
Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing k...
متن کاملIntroduction to advances in trust, security, and privacy for wireless networks
In recent years, wireless networks have become one of the most influential technological accomplishments and pervaded our daily lives in forms of mobile telephony and wireless computing. Due to their rapid development and widespread applications, trust, security, and privacy issues in wireless networks have become very important topics. As a result, there is a grand challenge to build wireless ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005