In order to investigate the enhancement of data privacy by distributing data packets via multiple paths,this paper formulates a security model and analyzes the privacy problem in multipath scenarios leveraging informa...In order to investigate the enhancement of data privacy by distributing data packets via multiple paths,this paper formulates a security model and analyzes the privacy problem in multipath scenarios leveraging information theoretic concept.Based on proposed model,a privacy function related to the path number is discussed.We heuristically recommend the optimal path number and analyze the tradeoff among the performance,resource consumption and privacy.For reducing the information leakage,the data schedule algorithms are also proposed.The analytical model can provide guidelines for the multipath protocol design.展开更多
Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover man...Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover management architecture containing four modules is proposed and the multihoming technology is adopted to achieve Make-Before-Break vertical handover. Then the paper presents the performance analysis of the architecture and simulation in ns-2. The results substantiate the effi cacy of the architecture in improving the handover performance signifi cantly compared with the traditional Mobile IPv6 (MIPv6) based vertical handover. Besides, we design and implement this handover management architecture in our test-bed. The experimental results in a real network environment show that our proposed architecture can not only support the Make-before-break handover, but also guarantee the scalability because of the modulized design.展开更多
基金This paper was partially supported by the National Basic Re-search Program of China under Grant No. 2007CB307100 the National Natural Science Foundation of China under Crant No 60972010 the Fundamental Research Funds for the Central U- niversities under Grant No. 2011JBM018.
文摘In order to investigate the enhancement of data privacy by distributing data packets via multiple paths,this paper formulates a security model and analyzes the privacy problem in multipath scenarios leveraging information theoretic concept.Based on proposed model,a privacy function related to the path number is discussed.We heuristically recommend the optimal path number and analyze the tradeoff among the performance,resource consumption and privacy.For reducing the information leakage,the data schedule algorithms are also proposed.The analytical model can provide guidelines for the multipath protocol design.
基金Acknov,.4edgements This work was supported in part by National Basic Research Program of China ("973 program") under contract No. 2007CB307101, and in part by National Natural Science Foundation of China under Grant No. 60833002, No. 60802016 and No.60972010.
基金supported in part by National Basic Research Program of China ("973 program") under contract No. 2007CB307101National Natural Science Foundation of China under Grant No. 60870015 and No. 60674008
文摘Recent advances in hardware technology have made it possible for mobile devices to interface with multiple networks of different types. In this paper, an IEEE 802.21 Media Independent Handover (MIH) based handover management architecture containing four modules is proposed and the multihoming technology is adopted to achieve Make-Before-Break vertical handover. Then the paper presents the performance analysis of the architecture and simulation in ns-2. The results substantiate the effi cacy of the architecture in improving the handover performance signifi cantly compared with the traditional Mobile IPv6 (MIPv6) based vertical handover. Besides, we design and implement this handover management architecture in our test-bed. The experimental results in a real network environment show that our proposed architecture can not only support the Make-before-break handover, but also guarantee the scalability because of the modulized design.