ON THE PRACTICAL FEASIBILITY OF SECURE MULTIPATH COMMUNICATION

Abstract

Secure multipath transmission (MPT) uses network path redundancy to achieve privacy in the absence of public-key encryption or any shared secrets for symmetric encryption. Since this form of secret communication works without secret keys, the risk of human failure in key management naturally vanishes, leaving security to rest only on the network management. Consequently, MPT allows for secure communication even under hacker attacks, on condition that at least some parts of the network remain intact (unconquered) at all times. This feature is, however, bought at the price of high network connectivity (densely meshed structures) that is hardly found in real life networks. Based on a game-theoretic treatment of multipath transmission, we present theoretical results for judging the networks suitability for secure communication. In particular, as MPT uses non-intersecting and reliable paths, we present algorithms to compute these in a way that is especially suited for subsequent secure and reliable communication. Our treatment will use MPT as a motivating and illustrating example, however, the results obtained are not limited to any particular application of multipath transmission or security.

Authors and Affiliations

Stefan Rass, Benjamin Rainer

Keywords

Related Articles

Grid Color Moment Features in Glaucoma Classification

Automated diagnosis of glaucoma disease is focused on the analysis of the retinal images to localize, perceive and evaluate the optic disc. Clinical decision support system (CDSS) is used for glaucoma classification in h...

Browsing Behaviour Analysis using Data Mining

Now-a-days most of our time is spent online using some form of digital technology such as search engines, news portals, or social media websites. Our online presence makes us engaged most of the time and leads us to beco...

Discovering Semantic and Sentiment Correlations using Short Informal Arabic Language Text

Semantic and Sentiment analysis have received a great deal of attention over the last few years due to the important role they play in many different fields, including marketing, education, and politics. Social media has...

Modified Grapheme Encoding and Phonemic Rule to Improve PNNR-Based Indonesian G2P

A grapheme-to-phoneme conversion (G2P) is very important in both speech recognition and synthesis. The existing Indonesian G2P based on pseudo nearest neighbour rule (PNNR) has two drawbacks: the grapheme encoding does n...

Synchronous Authentication Key Management Scheme for Inter-eNB Handover over LTE Networks

Handover process execution without active session termination is considered one of the most important attribute in the Long Term Evolution (LTE) networks. Unfortunately, this service always is suffered from the growing o...

Download PDF file
  • EP ID EP151805
  • DOI 10.14569/IJACSA.2013.041016
  • Views 103
  • Downloads 0

How To Cite

Stefan Rass, Benjamin Rainer (2013). ON THE PRACTICAL FEASIBILITY OF SECURE MULTIPATH COMMUNICATION. International Journal of Advanced Computer Science & Applications, 4(10), 99-108. https://europub.co.uk/articles/-A-151805