Download now Free registration required
A multi-hop wireless network with highly dynamic members and mobility is vulnerable to many attacks. To address this problem, the authors propose a novel time-based approach that exploits mobility. In the scheme, the source sends shares at different times. Due to node mobility, these shares will be routed through different intermediate nodes. It is highly unlikely that a particular intermediate node is able to be on many of these routes and to collect enough shares to reconstruct the original message. The scheme is particularly suitable for applications that can tolerate long message delays, as studied in Delay Tolerant Networks.
- Format: PDF
- Size: 1145.2 KB