21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

152 Chapter 5. Multipath <strong>Communication</strong><br />

Psi<br />

1<br />

0.8<br />

0.6<br />

0.4<br />

0.2<br />

Random spread; hop-to-hop authentication<br />

Random spread<br />

Hitpo<strong>in</strong>ts<br />

Concentrated<br />

Partition<br />

0<br />

0 100 200 300 400 500<br />

Compromised nodes<br />

Figure 5.14: Resilience of the tree-based multipath scheme under various attacks<br />

of attacks where compromised nodes are clustered. In both cases, the hitpo<strong>in</strong>t<br />

and the concentrated attacks, the scheme has significant advantages.<br />

5.5 Related Work<br />

The transmission of data over multiple paths has been widely studied and is<br />

extensively used <strong>in</strong> modern communication networks. Most practically used<br />

schemes, however, do not use the paths to transmit data redundantly but to<br />

<strong>in</strong>crease the availability or the bandwidth of a connection. The basis <strong>for</strong> the<br />

security of a multipath scheme is threshold security.<br />

5.5.1 Multiple Paths <strong>for</strong> Per<strong>for</strong>mance<br />

Multipath rout<strong>in</strong>g is a commonly used technique on the Internet, where the<br />

OSPF (Open Shortest Path First) protocol [128] is widely supported. It supports<br />

the ma<strong>in</strong>tenance of rout<strong>in</strong>g <strong>in</strong><strong>for</strong>mation about multiple paths that all have<br />

equal cost. A router computes the shortest paths to all target nodes and keeps<br />

a list of possible next hops <strong>for</strong> each target. One of them is selected <strong>for</strong> each<br />

new transmission. Thereby, multiple paths are used between two end-po<strong>in</strong>ts<br />

sequentially.<br />

For mobile ad hoc networks, node-disjo<strong>in</strong>t multipath rout<strong>in</strong>g has been widely<br />

studied. The ma<strong>in</strong> focus has been on improv<strong>in</strong>g the per<strong>for</strong>mance, i.e. band-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!