Publication:

Secure Data Communication in Mobile Ad Hoc Networks

cris.lastimport.scopus

2024-08-09T13:03:12Z

cris.lastimport.wos

2024-07-22T03:33:22Z

cris.legacyId

124928

cris.virtual.parent-organization

IINFCOM

cris.virtual.parent-organization

IC

cris.virtual.parent-organization

EPFL

cris.virtual.sciperId

171990

cris.virtual.unitId

10426

cris.virtual.unitManager

Mayoly, Camille Christine Myrèse

cris.virtualsource.author-scopus

6e9f3b4d-b307-4334-ad28-3fd969c0efdf

cris.virtualsource.department

6e9f3b4d-b307-4334-ad28-3fd969c0efdf

cris.virtualsource.orcid

6e9f3b4d-b307-4334-ad28-3fd969c0efdf

cris.virtualsource.parent-organization

c3e8b7a5-5212-423e-9a66-9448d537819c

cris.virtualsource.parent-organization

8abcd504-5ac4-46fa-8406-aa1caf8a214c

cris.virtualsource.parent-organization

8abcd504-5ac4-46fa-8406-aa1caf8a214c

cris.virtualsource.parent-organization

8abcd504-5ac4-46fa-8406-aa1caf8a214c

cris.virtualsource.parent-organization

8abcd504-5ac4-46fa-8406-aa1caf8a214c

cris.virtualsource.rid

6e9f3b4d-b307-4334-ad28-3fd969c0efdf

cris.virtualsource.sciperId

6e9f3b4d-b307-4334-ad28-3fd969c0efdf

cris.virtualsource.unitId

c3e8b7a5-5212-423e-9a66-9448d537819c

cris.virtualsource.unitId

8abcd504-5ac4-46fa-8406-aa1caf8a214c

cris.virtualsource.unitManager

c3e8b7a5-5212-423e-9a66-9448d537819c

cris.virtualsource.unitManager

8abcd504-5ac4-46fa-8406-aa1caf8a214c

datacite.rights

openaccess

dc.contributor.author

Papadimitratos, Panagiotis (Panos)

dc.contributor.author

Haas, Zygmunt J.

dc.date.accessioned

2008-05-31T21:40:02

dc.date.available

2008-05-31T21:40:02

dc.date.created

2008-05-31

dc.date.issued

2006

dc.date.modified

2024-10-17T20:46:01.756505Z

dc.description.abstract

We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectively cope with arbitrary malicious disruption of data transmissions, we propose and evaluate the secure message transmission (SMT) protocol and its alternative, the secure single-path (SSP) protocol. Among the salient features of SMT and SSP is their ability to operate solely in an end-to-end manner and without restrictive assumptions on the network trust and security associations. As a result, the protocols are applicable to a wide range of network architectures.We demonstrate that highly reliable communication can be sustained with small delay and small delay variability, even when a substantial portion of the network nodes systematically or intermittently disrupt communication. SMT and SSP robustly detect transmission failures and continuously configure their operation to avoid and tolerate data loss, and to ensure the availability of communication. This is achieved at the expense of moderate transmission and routing overhead, which can be traded off for delay. Overall, the ability of the protocols to mitigate both malicious and benign faults allows fast and reliable data transport even in highly adverse network environments.

dc.description.sponsorship

LCA

dc.description.sponsorship

LDS

dc.identifier.doi

10.1109/JSAC.2005.861392

dc.identifier.uri

https://infoscience.epfl.ch/handle/20.500.14299/26013

dc.relation

https://infoscience.epfl.ch/record/124928/files/JSAC-2006-SMT-Papadimtratos-ZJH.pdf

dc.relation.journal

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS

dc.subject

Fault tolerance

dc.subject

Mobile ad hoc network

dc.subject

MANET

dc.subject

Security

dc.subject

Multipath routing

dc.subject

Network security

dc.subject

Secure data transmission

dc.subject

Secure message transmission

dc.subject

Secure routing

dc.title

Secure Data Communication in Mobile Ad Hoc Networks

dc.type

text::journal::journal article::research article

dspace.entity.type

Publication

dspace.legacy.oai-identifier

oai:infoscience.tind.io:124928

epfl.legacy.fileversion

n/a

epfl.legacy.itemtype

Journal Articles

epfl.legacy.submissionform

ARTICLE

epfl.oai.currentset

OpenAIREv4

epfl.oai.currentset

fulltext

epfl.oai.currentset

IC

epfl.oai.currentset

article

epfl.peerreviewed

REVIEWED

epfl.publication.version

http://purl.org/coar/version/c_970fb48d4fbd8a85

epfl.writtenAt

OTHER

oaire.citation.endPage

356

oaire.citation.issue

2

oaire.citation.startPage

343

oaire.citation.volume

24

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
JSAC-2006-SMT-Papadimtratos-ZJH.pdf
Size:
770.82 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description:

Collections