Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks

Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks

Qunwei Zheng, Xiaoyan Hong, Jun Liu, Lei Tang
Copyright: © 2009 |Volume: 1 |Issue: 1 |Pages: 15
ISSN: 1941-8663|EISSN: 1941-8671|ISSN: 1941-8663|EISBN13: 9781615203789|EISSN: 1941-8671|DOI: 10.4018/jitn.2009010106
Cite Article Cite Article

MLA

Zheng, Qunwei, et al. "Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks." IJITN vol.1, no.1 2009: pp.80-94. http://doi.org/10.4018/jitn.2009010106

APA

Zheng, Q., Hong, X., Liu, J., & Tang, L. (2009). Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 1(1), 80-94. http://doi.org/10.4018/jitn.2009010106

Chicago

Zheng, Qunwei, et al. "Time-Based Confidentiality Enhancement Scheme for Mobile Wireless Networks," International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 1, no.1: 80-94. http://doi.org/10.4018/jitn.2009010106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A multi-hop wireless network with highly dynamic members and mobility is vulnerable to many attacks. To address this problem, we propose a novel time-based approach that exploits mobility. In our scheme, the source sends shares at different times. Due to node mobility, these shares will be routed through different intermediate nodes. It is highly unlikely that a particular intermediate node is able to be on many of these routes and to collect enough shares to reconstruct the original message. The scheme is particularly suitable for applications that can tolerate long message delays, as studied in Delay Tolerant Networks. The article focuses on analyzing the feasibility of this scheme. We describe a general approach to calculate the probability of intercepting enough shares by arbitrary nodes, together with simulations. The results show that the probability is small. The scheme provides a valuable alternative for delay tolerant applications to enhance message confidentiality.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.