ON THE PRACTICAL FEASIBILITY OF SECURE MULTIPATH COMMUNICATION

Abstract

Secure multipath transmission (MPT) uses network path redundancy to achieve privacy in the absence of public-key encryption or any shared secrets for symmetric encryption. Since this form of secret communication works without secret keys, the risk of human failure in key management naturally vanishes, leaving security to rest only on the network management. Consequently, MPT allows for secure communication even under hacker attacks, on condition that at least some parts of the network remain intact (unconquered) at all times. This feature is, however, bought at the price of high network connectivity (densely meshed structures) that is hardly found in real life networks. Based on a game-theoretic treatment of multipath transmission, we present theoretical results for judging the networks suitability for secure communication. In particular, as MPT uses non-intersecting and reliable paths, we present algorithms to compute these in a way that is especially suited for subsequent secure and reliable communication. Our treatment will use MPT as a motivating and illustrating example, however, the results obtained are not limited to any particular application of multipath transmission or security.

Authors and Affiliations

Stefan Rass, Benjamin Rainer

Keywords

Related Articles

An Empirical Investigation on a Tool-Based Boilerplate Technique to Improve Software Requirement Specification Quality

The process of producing software requirements specification (SRS) is known to be challenging due to the amount of effort, skills and experience needed in writing good quality SRS. A tool-based boilerplate technique is i...

Outcome based Assessment using Fuzzy Logic

Outcome Based Education (OBE) or student centered learning is one of the key component in quality assurance and enhancement in the higher education. The OBE approach encourages students to become active learner rather th...

Cloud Management and Governance: Adapting IT Outsourcing to External Provision of Cloud-Based IT Services

Outsourcing is a strategic option which complements IT services provided internally in organizations. The maturity model for IT service outsourcing (henceforth MM-2GES) is a new holistic maturity model based on standards...

A Novel Approach for On-road Vehicle Detection and Tracking

On the basis of a necessary development of the road safety, vision-based vehicle detection techniques have gained an important amount of attention. This work presents a novel vehicle detection and tracking approach, and...

Roadmap to Project Management Office (PMO) and Automation using a Multi-Stage Fuzzy Rules System

The Project Management Office (PMO) has proven to be a successful approach to enhance the control on projects and improve their success rate. One of the main functions of the PMO is monitoring projects and ensuring that...

Download PDF file
  • EP ID EP151805
  • DOI 10.14569/IJACSA.2013.041016
  • Views 108
  • Downloads 0

How To Cite

Stefan Rass, Benjamin Rainer (2013). ON THE PRACTICAL FEASIBILITY OF SECURE MULTIPATH COMMUNICATION. International Journal of Advanced Computer Science & Applications, 4(10), 99-108. https://europub.co.uk/articles/-A-151805