ON THE PRACTICAL FEASIBILITY OF SECURE MULTIPATH COMMUNICATION

Abstract

Secure multipath transmission (MPT) uses network path redundancy to achieve privacy in the absence of public-key encryption or any shared secrets for symmetric encryption. Since this form of secret communication works without secret keys, the risk of human failure in key management naturally vanishes, leaving security to rest only on the network management. Consequently, MPT allows for secure communication even under hacker attacks, on condition that at least some parts of the network remain intact (unconquered) at all times. This feature is, however, bought at the price of high network connectivity (densely meshed structures) that is hardly found in real life networks. Based on a game-theoretic treatment of multipath transmission, we present theoretical results for judging the networks suitability for secure communication. In particular, as MPT uses non-intersecting and reliable paths, we present algorithms to compute these in a way that is especially suited for subsequent secure and reliable communication. Our treatment will use MPT as a motivating and illustrating example, however, the results obtained are not limited to any particular application of multipath transmission or security.

Authors and Affiliations

Stefan Rass, Benjamin Rainer

Keywords

Related Articles

Analytical and Comparative Study of Different Types of Two-Leg Chopping Up Regulator

The main focus of this article is to analyze and simulate the two-leg parallel connection of a chopping up regulator with flattering inductive smoothers or with an interphasing centre-tap transformer supplied by a three-...

Mining Volunteered Geographic Information datasets with heterogeneous spatial reference 

When the information created online by users has a spatial reference, it is known as Volunteered Geographic Information (VGI). The increased availability of spatiotemporal data collected from satellite imagery and other...

Design of an Error Output Feedback Digital Delta Sigma Modulator with In–Stage Dithering for Spur–Free Output Spectrum

Digital Delta Sigma Modulator (DDSM) is responsible for generation of spurious tones at the output of fractional n frequency synthesizer due their inherent periodicity. This results in an impure output spectrum of freque...

Formal Specification of Memory Coherence Protocol

Memory coherence is the most fundamental re-quirement in a shared virtual memory system where there are concurrent as well as loosely coupled processes. These processes can demand a page for reading or writing. The memor...

NHCA: Developing New Hybrid Cryptography Algorithm for Cloud Computing Environment

The amount of transmitted data through the internet become larger and larger every day. The need of an encryption algorithm that guarantee transmitting data speedily and in a secure manner become a must. The aim of the r...

Download PDF file
  • EP ID EP151805
  • DOI 10.14569/IJACSA.2013.041016
  • Views 112
  • Downloads 0

How To Cite

Stefan Rass, Benjamin Rainer (2013). ON THE PRACTICAL FEASIBILITY OF SECURE MULTIPATH COMMUNICATION. International Journal of Advanced Computer Science & Applications, 4(10), 99-108. https://europub.co.uk/articles/-A-151805