ON THE PRACTICAL FEASIBILITY OF SECURE MULTIPATH COMMUNICATION
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 10
Abstract
Secure multipath transmission (MPT) uses network path redundancy to achieve privacy in the absence of public-key encryption or any shared secrets for symmetric encryption. Since this form of secret communication works without secret keys, the risk of human failure in key management naturally vanishes, leaving security to rest only on the network management. Consequently, MPT allows for secure communication even under hacker attacks, on condition that at least some parts of the network remain intact (unconquered) at all times. This feature is, however, bought at the price of high network connectivity (densely meshed structures) that is hardly found in real life networks. Based on a game-theoretic treatment of multipath transmission, we present theoretical results for judging the networks suitability for secure communication. In particular, as MPT uses non-intersecting and reliable paths, we present algorithms to compute these in a way that is especially suited for subsequent secure and reliable communication. Our treatment will use MPT as a motivating and illustrating example, however, the results obtained are not limited to any particular application of multipath transmission or security.
Authors and Affiliations
Stefan Rass, Benjamin Rainer
An Empirical Investigation on a Tool-Based Boilerplate Technique to Improve Software Requirement Specification Quality
The process of producing software requirements specification (SRS) is known to be challenging due to the amount of effort, skills and experience needed in writing good quality SRS. A tool-based boilerplate technique is i...
Outcome based Assessment using Fuzzy Logic
Outcome Based Education (OBE) or student centered learning is one of the key component in quality assurance and enhancement in the higher education. The OBE approach encourages students to become active learner rather th...
Cloud Management and Governance: Adapting IT Outsourcing to External Provision of Cloud-Based IT Services
Outsourcing is a strategic option which complements IT services provided internally in organizations. The maturity model for IT service outsourcing (henceforth MM-2GES) is a new holistic maturity model based on standards...
A Novel Approach for On-road Vehicle Detection and Tracking
On the basis of a necessary development of the road safety, vision-based vehicle detection techniques have gained an important amount of attention. This work presents a novel vehicle detection and tracking approach, and...
Roadmap to Project Management Office (PMO) and Automation using a Multi-Stage Fuzzy Rules System
The Project Management Office (PMO) has proven to be a successful approach to enhance the control on projects and improve their success rate. One of the main functions of the PMO is monitoring projects and ensuring that...